Essays about: "Datornätverk"

Showing result 1 - 5 of 15 essays containing the word Datornätverk.

  1. 1. Mitigation of inter-domain Policy Violations at Internet eXchange Points

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Muhammad Raheem; [2019]
    Keywords : IXP; Computer Networks; Distributed Systems; SDN; OpenFlow; BGP; Open vSwitch; Security; Firewall; Monitoring; IXP; Datornätverk; Distribuerade System; SDN; OpenFlow; BGP; Open vSwitch; Säkerhet; Brandvägg; Övervakning;

    Abstract : Economic incentives and the need to efficiently deliver Internet have led to the growth of Internet eXchange Points (IXPs), i.e., the interconnection networks through which a multitude of possibly competing network entities connect to each other with the goal of exchanging traffic. READ MORE

  2. 2. Mitigation of inter-domain Policy Violations at Internet eXchange Points

    University essay from KTH/Network Systems Laboratory (NS Lab)

    Author : Muhammad Raheem; [2019]
    Keywords : IXP; Computer Networks; Distributed Systems; SDN; OpenFlow; BGP; Open vSwitch; Security; Firewall; Monitoring; IXP; Datornätverk; Distribuerade System; SDN; OpenFlow; BGP; Open vSwitch; Säkerhet; Brandvägg; Övervakning;

    Abstract : Economic incentives and the need to efficiently deliver Internet have led to the growth of Internet eXchange Points (IXPs), i.e., the interconnection networks through which a multitude of possibly competing network entities connect to each other with the goal of exchanging traffic. READ MORE

  3. 3. Visualization and Natural Language Representation of Simulated Cyber Attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xinyue Mao; [2018]
    Keywords : attack path visualization; taxonomy for attack graph; natural language representation; attackvägsvisualisering; taxonomi för attackgraf; naturlig språkrepresentation;

    Abstract : The attack path is an effective tool for showing possible hacking routestaken by an attacker to target a specific computer network. It also informsadministrators about potential weakness in a network helpingthem roll-out network configuration changes. Based on predefinedcomputing methods, a large number of attack paths can be generated. READ MORE

  4. 4. Centralized log management for complex computer networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marcus Hanikat; [2018]
    Keywords : Logging ; Log management ; Computer networks ; Centralization ; Security; Loggning ; Log hantering; Datornätverk ; Centralisering ; Säkerhet;

    Abstract : In modern computer networks log messages produced on different devices throughout the network is collected and analyzed. The data from these log messages gives the network administrators an overview of the networks operation, allows them to detect problems with the network and block security breaches. READ MORE

  5. 5. The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jani Bonnevier; Sebastian Heimlén; [2018]
    Keywords : firewall; firewall configuration; threat modeling; network security; information security; brandvägg; brandväggskonfiguration; hotmodellering; nätverkssäkerhet; informationssäkerhet;

    Abstract : Firewalls help protect computer networks from intrusions and malware by enforcing restrictions on what network traffic is allowed to pass through the firewall into the network. This thesis explores the role of firewalls in network security, with the ultimate goal of advancing attempts to create a threat model for firewalls. READ MORE