Essays about: "Distributed Denial of Service"
Showing result 1 - 5 of 29 essays containing the words Distributed Denial of Service.
-
1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE
-
2. CarGo : A Decentralized Protocol for Booking and Payment in Car-Sharing Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Sharing commodities such as vehicles and houses in exchange for a fee has become very popular in the recent years. Companies such as Uber and Airbnb are two examples where their users can rent their underutilized assets for a period of time. READ MORE
-
3. Edge Computing Security for IoT : A Systematic Literature Review
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : This study conducts a systematic literature review (SLR) to explore the security threats, their mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the security of IoT devices in edge computing environments. Utilizing digital libraries as resources, the review examines three research questions that delve into the common security threats for IoT devices in edge computing, the unique security issues for sensors, gateways, and actuators, and the advantages of integrating blockchain and 5G technologies into edge computing security for IoT systems. READ MORE
-
4. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE
-
5. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. READ MORE