Essays about: "nätverkssäkerhet"

Showing result 1 - 5 of 17 essays containing the word nätverkssäkerhet.

  1. 1. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  2. 2. Impact of interfering rouge access points on modulationand coding in IoT network

    University essay from KTH/Hälsoinformatik och logistik

    Author : Amgad Shaher Saif; [2023]
    Keywords : Rogue access point; internet of things; modulation and coding scheme; round trip time; radio frequency interference; network latency; network security.; Obehörig åtkomstpunkt; sakernas internet; modulation och kodningsschema; round trip time; radiofrekvensinterferens; nätverkslatens; nätverkssäkerhet.;

    Abstract : This Bachelor thesis presents an in-depth investigation into the effects of RogueAccess Point interference within Internet of Things networks. The study focuses onthe impact of rogue APs on the modulation and coding scheme indices, round triptime, and overall network performance. READ MORE

  3. 3. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yang Wang; [2023]
    Keywords : Network Attribution. Cyber Range; Ethical Hacking Course. Graph Database.; Nätverksattribuering; Cyberområde; Etisk Hackningskurs; Grafisk Databas;

    Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE

  4. 4. Self-Play Reinforcement Learning for Finding Intrusion Prevention Strategies

    University essay from KTH/Matematisk statistik

    Author : Jakob Stymne; [2022]
    Keywords : Network security; automation; reinforcement learning; Markov Security Games; Neural Fictitious Self Play; Nätverkssäkerhet; automatisering; förstärkningsinlärning; Markovianska säkerhetsspel; Neural Fictitious Self Play;

    Abstract : This Master thesis studies automated intrusion prevention using self-play reinforcement learning. We extend a decision-theoretic model of the intrusion prevention use case based on optimal stopping theory proposed in previous work to a game-theoretic setting. READ MORE

  5. 5. Attribute-Based Encryption with dynamic attribute feature applied in Vehicular Ad Hoc Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zijian Huang; [2022]
    Keywords : Ciphertext-Policy Attribute-based encryption; Dynamic Attributes; Network Security; Vehicular Ad Hoc Networks; Ciphertext-Policy Attributbaserad kryptering; dynamiska attribut; nätverkssäkerhet; fordonsbaserade ad hoc-nätverk;

    Abstract : The Vehicular Ad Hoc Network (VANET) is a promising approach for future Intelligent Transportation Systems (ITS) implementation. The data transmission is wireless primarily in the VANET system. The secure data transmission in VANET attracts research attention without any doubt. READ MORE