Essays about: "överbelastningsattack"
Found 5 essays containing the word överbelastningsattack.
-
1. Adagio For The Internet Of Things : IoT penetration testing and security analysis of a smart plug
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The emergence of the Internet of Things (IoT) shows us that more and more devices will be connected to the internet for all types of different purposes. One of those devices, the smart plug, have been rapidly deployed because of the ease it brings users into achieving home automation by turning their previous dumb devices smart by giving them the means of controlling the devices remotely. READ MORE
-
2. Identification and Exploitation of Vulnerabilities in a Large-Scale ITSystem
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis presents the results of a vulnerability assessment and exploit development targeting a large-scale IT-system. Penetration testing and threat modelling was used to identify vulnerabilities in the system. READ MORE
-
3. Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic
University essay from KTH/Matematisk statistikAbstract : With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. READ MORE
-
4. Security challenges within Software Defined Networks
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : A large amount of today's communication occurs within data centers where a large number of virtual servers (running one or more virtual machines) provide service providers with the infrastructure needed for their applications and services. In this thesis, we will look at the next step in the virtualization revolution, the virtualized network. READ MORE
-
5. Vulnerability in a cyberattack : How DoS affects Swedish government authorities
University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystemAbstract : With a growing development of technologies and the fact that many companies implements online services, an interruption in such service could cause problems for any kind of user by exploiting the vulnerabilities in these systems. The Swedish Armed Forces (SwAF) indicates that the development of the defensive ability must continue, since the vulnerability of the cyberenvironment becomes a greater interest for adversaries. READ MORE