Essays about: "denial-of-service attacks"
Showing result 21 - 25 of 78 essays containing the words denial-of-service attacks.
-
21. Denial-of-service attacks against the Parrot ANAFI drone
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As the IoT market continues to grow, so does the need for secure wireless communication. Drones have become a popular gadget among both individuals and various industries during the last decade, and the popularity continues to grow. READ MORE
-
22. Performance comparison between Apache and NGINX under slow rate DoS attacks
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : One of the novel threats to the internet is the slow HTTP Denial of Service (DoS) attack on the application level targeting web server software. The slow HTTP attack can leave a high impact on web server availability to normal users, and it is affordable to be established compared to other types of attacks, which makes it one of the most feasible attacks against web servers. READ MORE
-
23. Network Hardening of Multilayer Switch
University essay from Mälardalens högskola/Akademin för innovation, design och teknikAbstract : In today’s computer networking and industrial networking, security holds a significant role in keeping the entire network safe from malicious users or attackers from remote locations. Using vulnerability scanners and a port scanner it is possible to detect vulnerabilities on the network equipment before an attacker finds the vulnerability and exploits it. READ MORE
-
24. Adagio For The Internet Of Things : IoT penetration testing and security analysis of a smart plug
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The emergence of the Internet of Things (IoT) shows us that more and more devices will be connected to the internet for all types of different purposes. One of those devices, the smart plug, have been rapidly deployed because of the ease it brings users into achieving home automation by turning their previous dumb devices smart by giving them the means of controlling the devices remotely. READ MORE
-
25. Evaluation of Security Methods for the MQTT Protocol
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : There is an increasing trend of Internet of Things (IoT) solutions, and more products are getting connected to the internet. It is therefore important to create a protected link to prevent malicious attacks. This report includes Transport Layer Security (TLS) to create a secure link for the Message Queuing Telemetry Transport (MQTT) protocol. READ MORE