Essays about: "Denial of Service DoS"
Showing result 21 - 25 of 48 essays containing the words Denial of Service DoS.
-
21. Training LSTM RNN models for network flow data classification for attack intention recognition systems
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The classification of network attack data, and prediction of the next likely set of network traffic flows is of particular interest to the cyber security domain, as it forms the basis for the timely response to cyber attacks as they progress. This work presents an overview of the main Attack Intention Recognition (AIR) approaches and techniques proposed over the last few years and proceeds to propose a system for classifying and distinguishing different types of network attacks using LSTM-RNN models. READ MORE
-
22. Secure Self-Reconfiguring Services to Mitigate DoS Attacks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Protecting web services from cyber attacks is a complex problem requiring many layers of defense and mitigation strategies. Out of the diverse range of attacks, denial of service (DoS) attacks on the business logic – or the domain – are poorly studied and no widely accepted general-purpose software product to prevent these attacks exists today. READ MORE
-
23. Representing attacks in a cyber range
University essay from Linköpings universitet/Programvara och systemAbstract : Trained security experts can be a mitigating factor to sophisticated cyberattacks that aim to violate the confidentiality, integrity, and availability of information. Reproducible sessions in a safe training environment is an effective way of increasing the excellence of security experts. READ MORE
-
24. A study of slow denial of service mitigation tools and solutions deployed in the cloud
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Slow rate Denial of Service (DoS) attacks have been shown to be a very effective way of attacking vulnerable servers while using few resources. This thesis investigates the effectiveness of mitigation tools used for protection against slow DoS attacks, specifically slowheader and slow body. READ MORE
-
25. Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic
University essay from KTH/Matematisk statistikAbstract : With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. READ MORE