Essays about: "packet classification"

Showing result 1 - 5 of 20 essays containing the words packet classification.

  1. 1. Generic Encrypted Traffic Identification using Network Grammar : A Case Study in Passive OS Fingerprinting

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Lukas Rajala; Kevin Scott; [2022]
    Keywords : Passive OS Fingerprinting; Encrypted Traffic Identification; Automated Traffic Analysis; Machine Learning; Supervised Learning; Networks; Packet Classification; Security and Privacy;

    Abstract : The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attacking vulnerable devices on government or private company networks. The devices attacked are often forgotten computers that run operating systems with known exploits. READ MORE

  2. 2. Evaluation of embedded processors for next generation asic : Evaluation of open source Risc-V processors and tools ability to perform packet processing operations compared to Arm Cortex M7 processors

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mike Musasa Mutombo; [2021]
    Keywords : Network processing; Risc-V; Packet processing; Instruction set architecture; Open-source; Nätverksprocessorer; instruktionsuppsättnings arkitektur; Risc-V; öppen-källkod; processorer;

    Abstract : Nowadays, network processors are an integral part of information technology. With the deployment of 5G network ramping up around the world, numerous new devices are going to take advantage of their processing power and programming flexibility. READ MORE

  3. 3. Deep Learning-­Based Traffic Classification for Network Penetration Testing

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Adam Haavik; [2021]
    Keywords : ;

    Abstract : With the increasing amount of computers in society, the need to test and evaluate security of these are crucial to prevent various cyberattacks.  During a penetration test, a common methodology to follow is OSSTMM. Sometimes this method can not be followed in whole. READ MORE

  4. 4. A Concept for an Intrusion Detection System over Automotive Ethernet

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Hanna Lindwall; Pontus Ovhagen; [2020]
    Keywords : Intrusion Detection System; Deep Packet Inspection; Specification-based Detection; Anomaly-based Detection; V2G; Automotive Ethernet.; Technology and Engineering;

    Abstract : A modern automotive vehicle is a complex technical system, containing many electronic, mechanical, and software parts. Typically, a high-end vehicle contains 70 or more electronic control units (ECUs) on average. READ MORE

  5. 5. Machine learning based call drop healing in 5G

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Janani Ramaswamy Mudaliyar; [2020]
    Keywords : Technology and Engineering;

    Abstract : Self-Organizing Network (SON) functions include self-configuration, dynamic optimization and self-healing of networks. In the era of 5G, mobile operators are increasingly exploring areas of SON through Machine Learning (ML) techniques. READ MORE