Essays about: "application layer security"

Showing result 1 - 5 of 54 essays containing the words application layer security.

  1. 1. Physical Layer Security for MIMOTransmission of Short PacketCommunications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Varun Duvva; Bharath Reddy Anugu; [2024]
    Keywords : Physical Layer Security; Multiple-Input Multiple-Output; Short Packet communication; Maximum Ratio Combining; Maximum Ratio Transmission; and Beamforming;

    Abstract : This thesis explores the practical application of Physical Layer Security (PLS) inMultiple-Input Multiple-Output (MIMO) systems, particularly focusing on ShortPacket Communication (SPC). The aim is to enhance the security of wireless com-munications against eavesdropping threats. READ MORE

  2. 2. Cell Tower Localization using crowdsourced measurments

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carlos Escandón Álvarez; [2023]
    Keywords : Cell Tower Geolocation; Crowdsourced Measurements; Positioning; Machine Learning; Neural Networks;

    Abstract : This thesis explores the application of a neural network approach to cell tower localization using crowdsourced measurements. The deployment of cell tower infrastructure has been increasing exponentially in recent times as it is a crucial element of mobile communications. READ MORE

  3. 3. Secure log-management for an Apache Kafka-based data-streaming service

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Hjalmar Kull; Mirza Hujic; [2023]
    Keywords : Apache Kafka;

    Abstract : This thesis aims to investigate the prospect of using Apache Kafka to manage data streams based on secrecy/classification level and separate these data streams in order to meet the requirement set by the secrecy/classification levels. Basalt AB has the responsibility of managing classified data for private and state actors, including the Swedish Armed Forces and other organizations. READ MORE

  4. 4. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : SHIVAKUMAR YADAV JABBU; ANIRUDH SAI MADIRAJU; [2023]
    Keywords : Software Defined Networking; IP Spoofing; Flooding; DDoS Attacks; Data Plane; Mininet;

    Abstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE

  5. 5. Detection of Vulnerability Scanning Attacks using Machine Learning : Application Layer Intrusion Detection and Prevention by Combining Machine Learning and AppSensor Concepts

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Pojan Shahrivar; [2022]
    Keywords : Vulnerability Scanning; Random Forest; Web application security; Next-Gen Web application Firewall; Machine learning; Dynamic application security testing; Intrusion detection prevention;

    Abstract : It is well-established that machine learning techniques have been used with great success in other domains and has been leveraged to deal with sources of evolving abuse, such as spam. This study aims to determine whether machine learning techniques can be used to create a model that detects vulnerability scanning attacks using proprietary real-world data collected from tCell, a web application firewall. READ MORE