Essays about: "thesis for DoS attack"
Showing result 21 - 25 of 30 essays containing the words thesis for DoS attack.
-
21. Two way Firewall for Internet of Things
University essay from KTH/Skolan för elektro- och systemteknik (EES)Abstract : The Internet of Things(IoT), an emerging global Internet-based technical architecture impacts the security and privacy of the stakeholders involved. IoT security is the area of endeavour concerned with safeguarding connected devices and networks in the Internet of things. READ MORE
-
22. Intrusion protection of in-vehicle network: study and recommendations
University essay from KTH/Maskinkonstruktion (Inst.)Abstract : Modern vehicles include several electronic control units (ECUs), organized in a controller area network (CAN), and interact with external networks for reasons such as comfort, infotainment, and autonomy. The security risks from this increasing external interaction are alarming for the safety-critical vehicle systems, since possible attackers have more options for intrusion. READ MORE
-
23. Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks
University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystemAbstract : Data mining can be defined as the extraction of implicit, previously un-known, and potentially useful information from data. Numerous re-searchers have been developing security technology and exploring new methods to detect cyber-attacks with the DARPA 1998 dataset for Intrusion Detection and the modified versions of this dataset KDDCup99 and NSL-KDD, but until now no one have examined the performance of the Top 10 data mining algorithms selected by experts in data mining. READ MORE
-
24. Vulnerability in a cyberattack : How DoS affects Swedish government authorities
University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystemAbstract : With a growing development of technologies and the fact that many companies implements online services, an interruption in such service could cause problems for any kind of user by exploiting the vulnerabilities in these systems. The Swedish Armed Forces (SwAF) indicates that the development of the defensive ability must continue, since the vulnerability of the cyberenvironment becomes a greater interest for adversaries. READ MORE
-
25. Implementation of data-collection tools using NetFlow for statistical analysis at the ISP level
University essay from Akademin för innovation, design och teknikAbstract : Defending against Dos- and DDoS attacks is difficult to accomplish; finding and filtering out illegitimate traffic from the legitimate flow is near impossible. Taking steps to mitigate or even block the traffic can only be done once the IP addresses of the attackers are known. READ MORE