Essays about: "Denial-of-Service"
Showing result 1 - 5 of 92 essays containing the word Denial-of-Service.
-
1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE
-
2. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. READ MORE
-
3. Penetration testing of Sesame Smart door lock
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. READ MORE
-
4. CarGo : A Decentralized Protocol for Booking and Payment in Car-Sharing Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Sharing commodities such as vehicles and houses in exchange for a fee has become very popular in the recent years. Companies such as Uber and Airbnb are two examples where their users can rent their underutilized assets for a period of time. READ MORE
-
5. Penetration testing of a smart speaker
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Smart speakers are becoming increasingly ubiquitous. Previous research has studied the security of these devices; however, only some studies have employed a penetration testing methodology. Moreover, most studies have only investigated models by well-known brands such as the Amazon or Google. READ MORE