Essays about: "Security Protocol for the Internet"

Showing result 21 - 25 of 118 essays containing the words Security Protocol for the Internet.

  1. 21. Integrating Jamming Detection into Low-power Mesh Networks

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Wenbo Xiao; [2022]
    Keywords : ;

    Abstract : In the field of the Internet of Things (IoT), jamming attacks and anti-jamming countermeasures have always been a very important research directions. Jamming attacks are aimed at disturbing routine wireless communications by sending out intentional radio interference, which leads to packet loss, higher energy consumption, and even disruption of the whole network. READ MORE

  2. 22. Measuring The Adoption and The Effects of RPKI Route Validation and Filtering : Through active control plane and data plane measurements

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sergio Ricardo Hernández Torres; [2022]
    Keywords : BGP; IP; Routing; RPKI; Tier-1 ISP;

    Abstract : The BGP (Border Gateway Protocol) is responsible for establishing routing at the core of the Internet, yet it was not designed with security in mind. The Internet routing protocol is currently not secure — but its security can be enhanced. READ MORE

  3. 23. The Everyday Internet, a Minefield in Disguise : Characterization of different types of domains including malicious and popularity

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Linn Petersson; Rebecka Lindkvist; [2022]
    Keywords : characterisation; malicious; domains; vulnerabilities; cipher suites; TLS; protocols; security; certificates;

    Abstract : Today, security has become a growing concern for all internet users, where technology is developing faster than its security is implemented, which leads to insecure domains. In this thesis, we look at the reality of today’s domains and research if some categories of domains are safer than others and the reason behind it. READ MORE

  4. 24. Developing a modular, high-interaction honeypot using container virtualization

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Magnus Jonsson; Alexander Lysholm; Sophia Pham; Benjamin Sannholm; Oskar Svanström; Johan Valfridsson; [2021-09-14]
    Keywords : honeypot; container-based virtualization; docker; security; data collection; modular software design; SSH; database design; network monitorization;

    Abstract : A significant increase of attacks combined with companies neglecting cybersecurity poses a problem for the ever-growing number of Internet-connected devices. With honeypot technology being an invaluable tool for understanding adversaries’ strategies, this project aims to develop a modular honeypot that is able to evolve. READ MORE

  5. 25. Design and evaluation of an inter-core QUIC connection migration approach for intra-server load balancing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zhe Wang; [2021]
    Keywords : Intra-server load balancing; QUIC protocol; Connection migration; BPF; Connection management; Lastbalansering mellan servern; QUIC protokoll; Anslutningsmigrering; BPF; Anslutningshantering;

    Abstract : With the emergence of novel cloud applications and their critical latency demand [1], Quick UDP Internet Connection (QUIC) [2] was proposed as a new transport protocol that is promising to reduce the connection establishment overhead while providing security properties similar to Transport Layer Security (TLS) [3]. However, without an efficient task scheduling mechanism, the high cost for encryption and decryption in QUIC can easily lead to load imbalance among multiple Central Processing Unit (CPU) cores and thus cause a high tail latency. READ MORE