Essays about: "Nätverkssäkerhet"

Showing result 1 - 5 of 7 essays containing the word Nätverkssäkerhet.

  1. 1. Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexandra Kolonia; Rebecka Forsberg; [2020]
    Keywords : Network security; Privacy; Anonymity; Onion routing; Tor Organization; Wi-Fi data collection; Nätverkssäkerhet; Sekretess; Anonymitet; Lök-routing; Tor Organisation; Wifidatainsamling;

    Abstract : Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. READ MORE

  2. 2. Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic

    University essay from KTH/Matematisk statistik

    Author : Gabriel Damour; [2019]
    Keywords : Network Security; Distributed Denial of Service; DDoS; DoS; Anomaly Detection; Intrusion Detection; Attack Source Identification; Information Theory; Statistical Learnin; Nätverkssäkerhet; Distribuerad Överbelastningsattack; DDoS; DoS; Anomalidetektering; Intrångsdetektering; Identifiering av Attackkällor; Informationsteori; Maskininlärning;

    Abstract : With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. READ MORE

  3. 3. The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jani Bonnevier; Sebastian Heimlén; [2018]
    Keywords : firewall; firewall configuration; threat modeling; network security; information security; brandvägg; brandväggskonfiguration; hotmodellering; nätverkssäkerhet; informationssäkerhet;

    Abstract : Firewalls help protect computer networks from intrusions and malware by enforcing restrictions on what network traffic is allowed to pass through the firewall into the network. This thesis explores the role of firewalls in network security, with the ultimate goal of advancing attempts to create a threat model for firewalls. READ MORE

  4. 4. Security challenges within Software Defined Networks

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT); KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Haroon Ahmed; Gabriel Sund; [2014]
    Keywords : Software Defined Networks SDN ; network security; denial of service; distributed denial of service; multi-tenancy; mjukvarudefinierat nätverk; nätverkssäkerhet; överbelastningsattack; distribuerad överbelastningsattack; multitenans;

    Abstract : A large amount of today's communication occurs within data centers where a large number of virtual servers (running one or more virtual machines) provide service providers with the infrastructure needed for their applications and services. In this thesis, we will look at the next step in the virtualization revolution, the virtualized network. READ MORE

  5. 5. Refining a Network Model Concerning Network Security Risk Analysis

    University essay from KTH/Data- och elektroteknik; KTH/Data- och elektroteknik

    Author : Daniel Kuehn; Sofia Ljunggren; [2014]
    Keywords : Network Security; Risk Analysis; CySeMoL; P2AMF; Nätverkssäkerhet; Riskanalys; CySeMoL; P2AMF;

    Abstract : P²CySeMoL is a framework in which security risks are calculated and presented with a value referring to the probability that an attack will succeed in a system, mainly SCADA systems.This thesis covers the creation of a more granular network module for the P²CySeMoL security riskanalysis framework to better be able to represent a network in concrete modules and to enable security riskanalysis on a network infrastructure at a greater detail. READ MORE