Essays about: "thesis for DoS attack"
Showing result 1 - 5 of 30 essays containing the words thesis for DoS attack.
-
1. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE
-
2. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE
-
3. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE
-
4. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE
-
5. Behavioural analysis and signature-based detection of Slowloris
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : It is important to efficiently and correctly be able to detect and classify network traffic, both legitimate and malicious. The slow rate category of DoS attacks makes this task especially hard, as the generated traffic resembles legitimate traffic. READ MORE