Essays about: "sniffing"

Showing result 1 - 5 of 36 essays containing the word sniffing.

  1. 1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  2. 2. A cybersecurity audit of the Garmin Venu

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oliver Antal; [2023]
    Keywords : IoT wearables; cybersecurity; penetration testing; sniffing; fuzzing; sakernas internet bärbara enheter; cybersäkerhet; intrångstestning; avlyssning; störningsattacker;

    Abstract : The presence of smart wearables has established itself as a norm of the 21 st century, but the state of their trustworthiness from the viewpoint of personal safety remains debatable. The information gathered by such devices has great potential for personal safety risks and must be handled safely. READ MORE

  3. 3. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE

  4. 4. Intrusion Detection in the Internet of Things : From Sniffing to a Border Router’s Point of View

    University essay from Uppsala universitet/Datorteknik

    Author : Victoria Bull; [2023]
    Keywords : Internet of Things; IoT; intrusion detection; routing attacks;

    Abstract : The Internet of Things is expanding, and with the increasing numbers of connected devices,exploitation of those devices also becomes more common. Since IoT devices and IoT networksare used in many crucial areas in modern societies, ranging from everything between securityand militrary applications to healthcare monitoring and production efficiency, the need to securethese devices is of great importance for researchers and businesses. READ MORE

  5. 5. Pen-rotation scheme for growing pigs : effects on pig aggression and social affiliation

    University essay from SLU/Dept. of Biosystems and Technology (from 130101)

    Author : Moses Agbenyegah Gadri; [2023]
    Keywords : aggressive; affiliative; fighting; littermates; behaviours; reuniting;

    Abstract : This master project aimed to assess if a pen-rotation scheme mitigated the effects of reuniting pigs after temporal separation. Six groups of crossbred (Yorkshire and Hampshire) growing pigs, (8 - 10 littermates per group) aged between 12 – 13 weeks, were video recorded separately in their original home pens for 2 h before a temporal separation to undergo the pen rotation scheme in pairs for 3 days. READ MORE