Essays about: "Överbelastningsattacker"
Found 5 essays containing the word Överbelastningsattacker.
-
1. Defending against denial of service attacks in ETSI ITS-G5 networks
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : This thesis explores the combined subjects of keep alive forwarding, denial of service attacks and decentralized congestion control. In a society where the technical requirements on vehicles constantly escalate; inter-vehicle communication has risen as a potential springboard for new technologies. READ MORE
-
2. Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic
University essay from KTH/Matematisk statistikAbstract : With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. READ MORE
-
3. Adaptive Counteraction Against Denial of Service Attack
University essay from KTH/Nätverk och systemteknikAbstract : The Internet of Things (IoT) is the next generation of networked society where billions of, everyday-life, devices are directly connected to the Internet and able to communicate with each other. In particular, the Constrained Application Protocol (CoAP) has become the de-facto IoT standard for communication at the application layer, as a lightweight web transfer protocol affordable also for resource-constrained platforms. READ MORE
-
4. Security challenges within Software Defined Networks
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : A large amount of today's communication occurs within data centers where a large number of virtual servers (running one or more virtual machines) provide service providers with the infrastructure needed for their applications and services. In this thesis, we will look at the next step in the virtualization revolution, the virtualized network. READ MORE
-
5. Vulnerability in a cyberattack : How DoS affects Swedish government authorities
University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystemAbstract : With a growing development of technologies and the fact that many companies implements online services, an interruption in such service could cause problems for any kind of user by exploiting the vulnerabilities in these systems. The Swedish Armed Forces (SwAF) indicates that the development of the defensive ability must continue, since the vulnerability of the cyberenvironment becomes a greater interest for adversaries. READ MORE