Essays about: "Denial of Service DoS"

Showing result 21 - 25 of 48 essays containing the words Denial of Service DoS.

  1. 21. Training LSTM RNN models for network flow data classification for attack intention recognition systems

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : James Chilila Antoine; [2020]
    Keywords : ;

    Abstract : The classification of network attack data, and prediction of the next likely set of network traffic flows is of particular interest to the cyber security domain, as it forms the basis for the timely response to cyber attacks as they progress. This work presents an overview of the main Attack Intention Recognition (AIR) approaches and techniques proposed over the last few years and proceeds to propose a system for classifying and distinguishing different types of network attacks using LSTM-RNN models. READ MORE

  2. 22. Secure Self-Reconfiguring Services to Mitigate DoS Attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Silvan Zeller; [2019]
    Keywords : Rule-Based IDS; Runtime Verification; Domain Attacks; Self-Reconfiguring Systems;

    Abstract : Protecting web services from cyber attacks is a complex problem requiring many layers of defense and mitigation strategies. Out of the diverse range of attacks, denial of service (DoS) attacks on the business logic – or the domain – are poorly studied and no widely accepted general-purpose software product to prevent these attacks exists today. READ MORE

  3. 23. Representing attacks in a cyber range

    University essay from Linköpings universitet/Programvara och system

    Author : Niklas Hätty; [2019]
    Keywords : it-security; cyber range; information security; penetration testing; SVED; CRATE; cyber range; it-säkerhet; informationssäkerherhet; penetrationstestning; SVED; CRATE;

    Abstract : Trained security experts can be a mitigating factor to sophisticated cyberattacks that aim to violate the confidentiality, integrity, and availability of information. Reproducible sessions in a safe training environment is an effective way of increasing the excellence of security experts. READ MORE

  4. 24. A study of slow denial of service mitigation tools and solutions deployed in the cloud

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Niklas Larsson; Fredrik Ågren Josefsson; [2019]
    Keywords : slowloris; slow post; slow body; slow rate DoS; slow rate denail of service attack; DoS attacks; slow rate dos mitigation; apache; nginx; aws; elastic load balancer;

    Abstract : Slow rate Denial of Service (DoS) attacks have been shown to be a very effective way of attacking vulnerable servers while using few resources. This thesis investigates the effectiveness of mitigation tools used for protection against slow DoS attacks, specifically slowheader and slow body. READ MORE

  5. 25. Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic

    University essay from KTH/Matematisk statistik

    Author : Gabriel Damour; [2019]
    Keywords : Network Security; Distributed Denial of Service; DDoS; DoS; Anomaly Detection; Intrusion Detection; Attack Source Identification; Information Theory; Statistical Learnin; Nätverkssäkerhet; Distribuerad Överbelastningsattack; DDoS; DoS; Anomalidetektering; Intrångsdetektering; Identifiering av Attackkällor; Informationsteori; Maskininlärning;

    Abstract : With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. READ MORE