Essays about: "peering"
Showing result 1 - 5 of 7 essays containing the word peering.
-
1. Peering into the Dark : A Dark Web Digital Forensic Investigation on Windows 11
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The ability to access the Internet while remaining anonymous is a necessity in today's society. Whistleblowers need it to establish contact with journalists, and individuals living under repressive regimes need it to access essential resources. READ MORE
-
2. Measuring The Adoption and The Effects of RPKI Route Validation and Filtering : Through active control plane and data plane measurements
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The BGP (Border Gateway Protocol) is responsible for establishing routing at the core of the Internet, yet it was not designed with security in mind. The Internet routing protocol is currently not secure — but its security can be enhanced. READ MORE
-
3. Peering into the future: A study of the relationship between listed industry peer populations and stock price informativeness
University essay from Handelshögskolan i Stockholm/Institutionen för finansiell ekonomiAbstract : This thesis explores the relationship between US firms' stock price informativeness and the number of US public companies belonging to their same primary industry. The study is conducted on an unbalanced panel of 94,714 firm-year observations over the period from 1976 to 2016. READ MORE
-
4. Performance analysis of the FRRouting Route Server
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The delivery of IP traffic on the Internet depends on the complex interactions between a set of autonomous systems that exchange routing information about IP prefix destinations utilizing the Border Gateway Protocol (BGP). Autonomous systems are often connected to a route server located at an Internet eXchange Point, which facilitates the administration of BGP peering arrangements for all parties connected to it. READ MORE
-
5. Implementation of data-collection tools using NetFlow for statistical analysis at the ISP level
University essay from Akademin för innovation, design och teknikAbstract : Defending against Dos- and DDoS attacks is difficult to accomplish; finding and filtering out illegitimate traffic from the legitimate flow is near impossible. Taking steps to mitigate or even block the traffic can only be done once the IP addresses of the attackers are known. READ MORE