Essays about: "thesis for NETWORK SECURITY"

Showing result 1 - 5 of 411 essays containing the words thesis for NETWORK SECURITY.

  1. 1. Man in The Middle Attacks on Software Defined Network

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Eskil Christensson; [2023]
    Keywords : ;

    Abstract : Software Defined Networking (SDN) is a method of abstracting the network to ease administration by centralizing it. Doing this removes intelligence from the devices and this might open up local security vulnerabilities. READ MORE

  2. 2. Analysis of the security of a VXLAN network

    University essay from KTH/Hälsoinformatik och logistik

    Author : Markus Rehnberg; Erik Ekblad; [2023]
    Keywords : VXLAN; VLAN; security; networking; cloud-computing; VXLAN; VLAN; säkerhet; nätverk; molntjänster;

    Abstract : Traditionally, VLANs have been the most suitable solution for connecting computers. This, in line with the increased use of cloud services in recent years, has given rise to problems with scalability and security within VLAN networks, which need to be investigated. READ MORE

  3. 3. Study Of Universal Islanding Detection Techniques In Distributed Generation Systems

    University essay from Linnéuniversitetet/Institutionen för fysik och elektroteknik (IFE)

    Author : Ochai Ochalla Danladi; [2023]
    Keywords : Distributed Generation; Islanding; Quality Factor; Resonance Frequency; Low Voltage; Medium Voltage; Electronic Power Converter; Inverter;

    Abstract : Energy security, global warming, and climate change have been a major source of global discussions and development. Likewise, the rising cost of electricity for consumers and exponential demand for energy are major factors driving the incremental growth and integration of sustainable forms of energy generation into power the system cycle. READ MORE

  4. 4. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Keywords : Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Abstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE

  5. 5. Implementing and evaluating variations of the Blackhole attack on RPL

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Adam Pettersson; [2022]
    Keywords : ;

    Abstract : The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) is the most used routing protocol for resource constrained Internet-of-Things (IoT) networks. With the massive increase in number of Internet-connected IoT devices and the fact that they are becoming more common in safety-critical environments such as in health-care and in the industry, security in these networks are of a big concern. READ MORE