Essays about: "Web Application Security"

Showing result 11 - 15 of 130 essays containing the words Web Application Security.

  1. 11. Evaluation of Using the WebRTC Protocol as a Fully Distributed System : Measure, benchmark, and evaluate the performance of the WebRTC protocol

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Mryam Teklya Suyum; [2023]
    Keywords : Distributed Systems; WebRTC; WebSocket; HTTPS; Signaling Server; Peer-to-Peer Communication; RTP; RTCPeerConnection API; Performance Analysis; Latency RTT; Jitter; Packet Loss; Distribuerade system; WebRTC; WebSocket; HTTPS; signalserver; peer-to-peer-kommunikation; RTP; RTCPeerConnection API; prestandaanalys; latens RTT; jitter; paketförlust;

    Abstract : Syftet med detta examensarbete är att och utvärdera undersöka analysera och utvärdera prestandan hos WebRTC-protokollet, samt att utveckla en webbaserad klient med hjälp av JavaScript för distribuerade system och demonstrera protokollets användbarhet i ett verkligt scenario. Studien inkluderade användning av olika verktyg och bibliotek, såsom Socket. READ MORE

  2. 12. Detection of Vulnerability Scanning Attacks using Machine Learning : Application Layer Intrusion Detection and Prevention by Combining Machine Learning and AppSensor Concepts

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Pojan Shahrivar; [2022]
    Keywords : Vulnerability Scanning; Random Forest; Web application security; Next-Gen Web application Firewall; Machine learning; Dynamic application security testing; Intrusion detection prevention;

    Abstract : It is well-established that machine learning techniques have been used with great success in other domains and has been leveraged to deal with sources of evolving abuse, such as spam. This study aims to determine whether machine learning techniques can be used to create a model that detects vulnerability scanning attacks using proprietary real-world data collected from tCell, a web application firewall. READ MORE

  3. 13. Cooperative security log analysis using machine learning : Analyzing different approaches to log featurization and classification

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Fredrik Malmfors; [2022]
    Keywords : Machine learning; word embeddings; deep learning; LSTM; CNN; auto encoder; NLP; natural language processing; intrusion detection; log analysis; logs; log classification; anomaly detection; supervised learning; unsupervised learning;

    Abstract : This thesis evaluates the performance of different machine learning approaches to log classification based on a dataset derived from simulating intrusive behavior towards an enterprise web application. The first experiment consists of performing attacks towards the web app in correlation with the logs to create a labeled dataset. READ MORE

  4. 14. Recommender system for IT security scanning service : Collaborative filtering in an error report scenario

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jonas Thunberg; [2022]
    Keywords : Collaborative Filtering; Vulnerability Scanning; IT-Security; Recommender System;

    Abstract : Recommender systems have become an integral part of the user interface of many web applications. Recommending items to buy, media to view or similar “next choice”-recommendations has proven to be a powerful tool to improve costumer experience and engagement. READ MORE

  5. 15. Evaluating the efficiency of Host-based Intrusion Detection Systems protecting web applications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Adam Willerton; Rasmus Gustafsson; [2022]
    Keywords : Intrusion Detection System; IDS; Host-based Intrusion Detection System; HIDS; Web applications; Efficiency;

    Abstract : Background. Web applications are a more significant part of our digital experience, and the number of users keeps continuously growing. Social media alone accounts for more than half of the world’s population. Therefore these applications have become a lucrative target for attackers, and we have seen several attacks against them. READ MORE