Essays about: "SSH"

Showing result 1 - 5 of 21 essays containing the word SSH.

  1. 1. Primary Drivers of Sea Level Variability in the North – Baltic Sea Transition Using Machine Learning

    University essay from Göteborgs universitet/Institutionen för geovetenskaper

    Author : David Ek; [2023-01-09]
    Keywords : ;

    Abstract : Global mean sea level is rising, however not uniformly. Regional deviations of sea surface height (SSH) are common due to local drivers, including surface winds, ocean density stratifications, vertical land- & crustal movements and more. READ MORE

  2. 2. Analysing SSH Clients Using Protocol State Fuzzing

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Robert Lasu; [2023]
    Keywords : ;

    Abstract : .... READ MORE

  3. 3. X.509 Certificate-Based Authentication for NETCONF and RESTCONF : Design Evaluation between Native and External Implementation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qi Li; [2023]
    Keywords : NETCONF; RESTCONF; x509 over SSH; Erlang; Network Automation; PKIX; Public Key Infrastructure X.509 ; NETCONF; RESTCONF; x509 over SSH; Erlang; Nätverksautomatiserng; PKIX; Public Key Infrastructure X.509 ;

    Abstract : The Network Service Ochestrator (NSO) is a network automation system provided by Cisco that is used to automate large network changes with the ability to roll back in case of errors. It provides a rich northbound interface to communicate with the user and a southbound interface to orchestrate network devices securely. READ MORE

  4. 4. Developing a modular, high-interaction honeypot using container virtualization

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Magnus Jonsson; Alexander Lysholm; Sophia Pham; Benjamin Sannholm; Oskar Svanström; Johan Valfridsson; [2021-09-14]
    Keywords : honeypot; container-based virtualization; docker; security; data collection; modular software design; SSH; database design; network monitorization;

    Abstract : A significant increase of attacks combined with companies neglecting cybersecurity poses a problem for the ever-growing number of Internet-connected devices. With honeypot technology being an invaluable tool for understanding adversaries’ strategies, this project aims to develop a modular honeypot that is able to evolve. READ MORE

  5. 5. Masquerader Detection via 2fa Honeytokens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Anton Wiklund; [2021]
    Keywords : Cyber security deception; two-factor authentication 2fa ; honeytoken; misinformation; intrusion detection;

    Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE