Essays about: "thesis for NETWORK SECURITY"
Showing result 1 - 5 of 411 essays containing the words thesis for NETWORK SECURITY.
-
1. Man in The Middle Attacks on Software Defined Network
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Software Defined Networking (SDN) is a method of abstracting the network to ease administration by centralizing it. Doing this removes intelligence from the devices and this might open up local security vulnerabilities. READ MORE
-
2. Analysis of the security of a VXLAN network
University essay from KTH/Hälsoinformatik och logistikAbstract : Traditionally, VLANs have been the most suitable solution for connecting computers. This, in line with the increased use of cloud services in recent years, has given rise to problems with scalability and security within VLAN networks, which need to be investigated. READ MORE
-
3. Study Of Universal Islanding Detection Techniques In Distributed Generation Systems
University essay from Linnéuniversitetet/Institutionen för fysik och elektroteknik (IFE)Abstract : Energy security, global warming, and climate change have been a major source of global discussions and development. Likewise, the rising cost of electricity for consumers and exponential demand for energy are major factors driving the incremental growth and integration of sustainable forms of energy generation into power the system cycle. READ MORE
-
4. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE
-
5. Implementing and evaluating variations of the Blackhole attack on RPL
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) is the most used routing protocol for resource constrained Internet-of-Things (IoT) networks. With the massive increase in number of Internet-connected IoT devices and the fact that they are becoming more common in safety-critical environments such as in health-care and in the industry, security in these networks are of a big concern. READ MORE
