Essays about: "Slow HTTP DOS"
Showing result 1 - 5 of 14 essays containing the words Slow HTTP DOS.
-
1. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE
-
2. Effect of Proton Irradiation on the Mechanical Properties of Fe-10Cr-4Al in Liquid Lead
University essay from KTH/FysikAbstract : Among the structural materials under consideration for future lead-cooled fastreactors, special attention is paid to ferritic Fe-10Cr-4Al due to its superior corrosionand erosion protective properties, as well as its insensitivity to liquid metalembrittlement in liquid lead. This thesis gives an inside look into the radiation damageproperties of the alloy and the possible embrittlement scenarios. READ MORE
-
3. Mitigating HTTP Denial-of-Service Attacks on Self-Hosted Web Applications
University essay from KTH/DatavetenskapAbstract : Denial-of-service (DoS) attacks are a common threat to any resource on the internet, making knowledge regarding how to prevent them increasingly valuable. In this paper we have investigated different HTTP DoS attacks, how they affect web servers, and what steps one might take to protect a self-hosted web application from such attacks. READ MORE
-
4. Behavioural analysis and signature-based detection of Slowloris
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : It is important to efficiently and correctly be able to detect and classify network traffic, both legitimate and malicious. The slow rate category of DoS attacks makes this task especially hard, as the generated traffic resembles legitimate traffic. READ MORE
-
5. Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords : A Structured Literature Review
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it has been around for decades in the world of computer security. In theory, has the purpose to improve the security of user authentication by adding an extra layer of security to the process. READ MORE