Essays about: "ip network thesis"

Showing result 1 - 5 of 234 essays containing the words ip network thesis.

  1. 1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  2. 2. Mapping the Attack Surface of Telecommunication Networks from the Public Internet

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jayshree Rathi; [2023]
    Keywords : Attack Surface Mapping; Telecommunication; Passive Reconnaissance; Mobile Network Operator; Public Internet; Kartläggning av Attackytan; Telekommunikation; Passiv Rekon- naissance; Mobilnätsoperatör; Offentligt Internet;

    Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE

  3. 3. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : SHIVAKUMAR YADAV JABBU; ANIRUDH SAI MADIRAJU; [2023]
    Keywords : Software Defined Networking; IP Spoofing; Flooding; DDoS Attacks; Data Plane; Mininet;

    Abstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE

  4. 4. Investigating the Effectiveness of Stealthy Hijacks against Public Route Collectors : Is AS-Path Prepending Enough to Hide from Public Route Collectors?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Kunyu Wang; [2023]
    Keywords : BGP; BGP Hijack; Stealthy IP prefix hijacking; AS-Path Prepending; BGP monitoring; BGP; BGP Hijack; Stealthy IP prefix hijacking; AS-Path Prepending; BGP-övervakning;

    Abstract : BGP hijacking is a threat to network organizations because traditional BGP protocols were not designed with security in mind. Currently, research to combat hijacking is being done by detecting hijacking in real time from Public Route Collectors. READ MORE

  5. 5. Investigating Machine Learning for verification of AMBA APB protocol.

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Abhiram Srisai Kishore; Mohammed Wasim; [2022]
    Keywords : Machine learning; SOC Verification; AMBA; Neural Networks; Deep Learning; Assertions.; Technology and Engineering;

    Abstract : It is a well-known fact that in any Application Specific Integrated Circuit (ASIC) design, verification consumes most time and resources. And when it comes to huge designs, finding bugs can be tedious given the area and the complexity. As per Moore’s law, the design complexity is increasing exponentially due to the growing demand for performance. READ MORE