Essays about: "Security Protocol for the Internet"
Showing result 21 - 25 of 118 essays containing the words Security Protocol for the Internet.
-
21. Integrating Jamming Detection into Low-power Mesh Networks
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : In the field of the Internet of Things (IoT), jamming attacks and anti-jamming countermeasures have always been a very important research directions. Jamming attacks are aimed at disturbing routine wireless communications by sending out intentional radio interference, which leads to packet loss, higher energy consumption, and even disruption of the whole network. READ MORE
-
22. Measuring The Adoption and The Effects of RPKI Route Validation and Filtering : Through active control plane and data plane measurements
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The BGP (Border Gateway Protocol) is responsible for establishing routing at the core of the Internet, yet it was not designed with security in mind. The Internet routing protocol is currently not secure — but its security can be enhanced. READ MORE
-
23. The Everyday Internet, a Minefield in Disguise : Characterization of different types of domains including malicious and popularity
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Today, security has become a growing concern for all internet users, where technology is developing faster than its security is implemented, which leads to insecure domains. In this thesis, we look at the reality of today’s domains and research if some categories of domains are safer than others and the reason behind it. READ MORE
-
24. Developing a modular, high-interaction honeypot using container virtualization
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : A significant increase of attacks combined with companies neglecting cybersecurity poses a problem for the ever-growing number of Internet-connected devices. With honeypot technology being an invaluable tool for understanding adversaries’ strategies, this project aims to develop a modular honeypot that is able to evolve. READ MORE
-
25. Design and evaluation of an inter-core QUIC connection migration approach for intra-server load balancing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the emergence of novel cloud applications and their critical latency demand [1], Quick UDP Internet Connection (QUIC) [2] was proposed as a new transport protocol that is promising to reduce the connection establishment overhead while providing security properties similar to Transport Layer Security (TLS) [3]. However, without an efficient task scheduling mechanism, the high cost for encryption and decryption in QUIC can easily lead to load imbalance among multiple Central Processing Unit (CPU) cores and thus cause a high tail latency. READ MORE