Essays about: "thesis for DoS attack"

Showing result 21 - 25 of 30 essays containing the words thesis for DoS attack.

  1. 21. Two way Firewall for Internet of Things

    University essay from KTH/Skolan för elektro- och systemteknik (EES)

    Author : Challa Renuka Venkata Ramani; [2016]
    Keywords : ;

    Abstract : The Internet of Things(IoT), an emerging global Internet-based technical architecture impacts the security and privacy of the stakeholders involved. IoT security is the area of endeavour concerned with safeguarding connected devices and networks in the Internet of things. READ MORE

  2. 22. Intrusion protection of in-vehicle network: study and recommendations

    University essay from KTH/Maskinkonstruktion (Inst.)

    Author : Alexandros Asvestopoulos; [2015]
    Keywords : ;

    Abstract : Modern vehicles include several electronic control units (ECUs), organized in a controller area network (CAN), and interact with external networks for reasons such as comfort, infotainment, and autonomy. The security risks from this increasing external interaction are alarming for the safety-critical vehicle systems, since possible attackers have more options for intrusion. READ MORE

  3. 23. Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks

    University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystem

    Author : Rebecca Petersen; [2015]
    Keywords : Data mining; machine learning; cyber-attack; NSL-KDD; fea-tures; DoS; Probing; R2L; U2R.;

    Abstract : Data mining can be defined as the extraction of implicit, previously un-known, and potentially useful information from data. Numerous re-searchers have been developing security technology and exploring new methods to detect cyber-attacks with the DARPA 1998 dataset for Intrusion Detection and the modified versions of this dataset KDDCup99 and NSL-KDD, but until now no one have examined the performance of the Top 10 data mining algorithms selected by experts in data mining. READ MORE

  4. 24. Vulnerability in a cyberattack : How DoS affects Swedish government authorities

    University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystem

    Author : Peter Burgos; Julia Storsten; [2014]
    Keywords : DoS; DDoS; resilience; cyberattacks; cyberdefence; attacking tools;

    Abstract : With a growing development of technologies and the fact that many companies implements online services, an interruption in such service could cause problems for any kind of user by exploiting the vulnerabilities in these systems. The Swedish Armed Forces (SwAF) indicates that the development of the defensive ability must continue, since the vulnerability of the cyberenvironment becomes a greater interest for adversaries. READ MORE

  5. 25. Implementation of data-collection tools using NetFlow for statistical analysis at the ISP level

    University essay from Akademin för innovation, design och teknik

    Author : Daniel Karlström; [2012]
    Keywords : pmacct; statistical analysis; bgp; peer; peering; routing; route; quagga; virtual router; virtual; router; linux; graph; graphing; mrtg; database; mysql; script; scripting; python; bash; libpcap; mdh; data collection; data; collection; collecting; ISP; internet service provider; DoS; DDoS; attack; pmacct; statistisk analys; bgp; peer; peering; peera; routing; route; quagga; virtuell router; virtuell; router; linux; graf; grafa; mrtg; databas; mysql; script; scripting; python; bash; libpcap; mdh; datainsamling; insamling; data; ISP; internetleverantör; DoS; DDoS; attack;

    Abstract : Defending against Dos- and DDoS attacks is difficult to accomplish; finding and filtering out illegitimate traffic from the legitimate flow is near impossible. Taking steps to mitigate or even block the traffic can only be done once the IP addresses of the attackers are known. READ MORE