Essays about: "ICMP"

Showing result 1 - 5 of 13 essays containing the word ICMP.

  1. 1. Analysis of the security of a VXLAN network

    University essay from KTH/Hälsoinformatik och logistik

    Author : Markus Rehnberg; Erik Ekblad; [2023]
    Keywords : VXLAN; VLAN; security; networking; cloud-computing; VXLAN; VLAN; säkerhet; nätverk; molntjänster;

    Abstract : Traditionally, VLANs have been the most suitable solution for connecting computers. This, in line with the increased use of cloud services in recent years, has given rise to problems with scalability and security within VLAN networks, which need to be investigated. READ MORE

  2. 2. What's the Deal with Stegomalware? : The Techniques, Challenges, Defence and Landscape

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Kristoffer Björklund; [2021]
    Keywords : Stegomalware; steganography; information hiding; covert channel;

    Abstract : Stegomalware is the art of hiding malicious software with steganography. Steganography is the technique of hiding data in a seemingly innocuous carrier. The occurrence of stegomalware is increasing, with attackers using ingenious techniques to avoid detection. READ MORE

  3. 3. LATENCY AND THROUGHPUT COMPARISON BETWEEN IPTABLES AND NFTABLES AT DIFFERENT FRAME AND RULE-SET SIZES

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Tomas Jonsson; [2018]
    Keywords : Firewall; Iptables; Nftables; Latency; Throughput; Performance; Brandvägg; Iptables; Nftables; Latens; Genomströmning; Prestanda;

    Abstract : Firewalls are one of the most common security tools used in computer networks. Its purpose is to prevent unwanted traffic from coming in to or out of a computer network. READ MORE

  4. 4. CLIENT-SIDE EVALUATION OF QUALITY OF SERVICE IN CLOUD APPLICATIONS

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Jonathan Larsson; [2017]
    Keywords : Cloud computing; performance evaluation; monitoring; horizontal scaling; vertical scaling; scaling techniques;

    Abstract : Cloud computing is a constantly developing topic that reaches most of the people in the world on a daily basis. Almost every website and mobile application is hosted through a cloud provider. Two of the most important metrics for customers is performance and availability. READ MORE

  5. 5. Evaluation of Intrusion Detection Systems under Denial of Service Attack in virtual  Environment

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : venkatesh nagadevara; [2017]
    Keywords : snort; suricata; ossec; intrusion detection system;

    Abstract : Context. The intrusion detection systems are being widely used for detecting the malicious traffic in many industries and they use a variety of technologies. Each IDs had different architecture and are deployed for detecting malicious activity. Intrusion detection system has a different set of rules which can defined based on requirement. READ MORE