Essays about: "överbelastningsattack"

Found 5 essays containing the word överbelastningsattack.

  1. 1. Adagio For The Internet Of Things : IoT penetration testing and security analysis of a smart plug

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Raman Salih; [2021]
    Keywords : ;

    Abstract : The emergence of the Internet of Things (IoT) shows us that more and more devices will be connected to the internet for all types of different purposes. One of those devices, the smart plug, have been rapidly deployed because of the ease it brings users into achieving home automation by turning their previous dumb devices smart by giving them the means of controlling the devices remotely. READ MORE

  2. 2. Identification and Exploitation of Vulnerabilities in a Large-Scale ITSystem

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : David Skeppstedt; [2019]
    Keywords : ;

    Abstract : This thesis presents the results of a vulnerability assessment and exploit development targeting a large-scale IT-system. Penetration testing and threat modelling was used to identify vulnerabilities in the system. READ MORE

  3. 3. Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic

    University essay from KTH/Matematisk statistik

    Author : Gabriel Damour; [2019]
    Keywords : Network Security; Distributed Denial of Service; DDoS; DoS; Anomaly Detection; Intrusion Detection; Attack Source Identification; Information Theory; Statistical Learnin; Nätverkssäkerhet; Distribuerad Överbelastningsattack; DDoS; DoS; Anomalidetektering; Intrångsdetektering; Identifiering av Attackkällor; Informationsteori; Maskininlärning;

    Abstract : With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. READ MORE

  4. 4. Security challenges within Software Defined Networks

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Haroon Ahmed; Gabriel Sund; [2014]
    Keywords : Software Defined Networks SDN ; network security; denial of service; distributed denial of service; multi-tenancy; mjukvarudefinierat nätverk; nätverkssäkerhet; överbelastningsattack; distribuerad överbelastningsattack; multitenans;

    Abstract : A large amount of today's communication occurs within data centers where a large number of virtual servers (running one or more virtual machines) provide service providers with the infrastructure needed for their applications and services. In this thesis, we will look at the next step in the virtualization revolution, the virtualized network. READ MORE

  5. 5. Vulnerability in a cyberattack : How DoS affects Swedish government authorities

    University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystem

    Author : Peter Burgos; Julia Storsten; [2014]
    Keywords : DoS; DDoS; resilience; cyberattacks; cyberdefence; attacking tools;

    Abstract : With a growing development of technologies and the fact that many companies implements online services, an interruption in such service could cause problems for any kind of user by exploiting the vulnerabilities in these systems. The Swedish Armed Forces (SwAF) indicates that the development of the defensive ability must continue, since the vulnerability of the cyberenvironment becomes a greater interest for adversaries. READ MORE