Essays about: "thesis for NETWORK SECURITY"

Showing result 16 - 20 of 375 essays containing the words thesis for NETWORK SECURITY.

  1. 16. Automating software installation for cyber security research and testing public exploits in CRATE

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Joakim Kahlström; Johan Hedlin; [2021]
    Keywords : cyber range; software installation; cyber security; CRATE; exploit testing; automation; cyberanläggning; mjukvaruinstallation; cybersäkerhet; CRATE; angreppstestning; automatisering;

    Abstract : As cyber attacks are an ever-increasing threat to many organizations, the need for controlled environments where cyber security defenses can be tested against real-world attacks is increasing. These environments, called cyber ranges, exist across the world for both military and academic purposes of various scales. READ MORE

  2. 17. Privacy and user profiling : Profile-based evaluation of what different third party services may learn about a user

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Isabell Öknegård Enavall; Julia Mineur; [2021]
    Keywords : third parties; privacy; network security; user modeling;

    Abstract : Online behavioural targeted advertising has become a leading method to increase theeffectiveness of advertisement online. The advertisement is based on information aboutusers’ internet activities collected by third party tracking services. READ MORE

  3. 18. Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Srinath Potnuru; [2021]
    Keywords : RRC; 5G NR; robustness testing; fuzzing; ASN.1; network protocol testing; vulnerability detection; software security; RRC; 5G NR; robusthetstest; fuzzing; ASN.1; nätverksprotokolltestning; sårbarhetsdetektering; mjukvarusäkerhet;

    Abstract : 5G telecommunication systems must be ultra-reliable to meet the needs of the next evolution in communication. The systems deployed must be thoroughly tested and must conform to their standards. Software and network protocols are commonly tested with techniques like fuzzing, penetration testing, code review, conformance testing. READ MORE

  4. 19. SDP And VPN For Remote Access : A Comparative Study And Performance Evaluation

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM); Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Abel Tariku Sintaro; Yemi Emmanuel Komolafe; [2021]
    Keywords : Zero-Trust security model; Perimeter-based security model; Software- defined perimeter; IPSec VPN; performance evaluation; comparative study;

    Abstract : Remote access is a way of providing access to networks from outside the premises of the network. Virtual Private Network (VPN) is one solution used to provide remote access. Software-Defined Perimeter (SDP) is another solution that is capable of providing access to resources from a remote location. READ MORE

  5. 20. Bayesian Reinforcement Learning Methods for Network Intrusion Prevention

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Antonio Frederico Nesti Lopes; [2021]
    Keywords : Network Security; Reinforcement Learning; Bayesian Q-Learning; Bayesian Policy Gradient; Bayesian Actor-Critic; Markov Security Games; Nätverkssäkerhet; förstärkningslärande; Bayesian Q-Learning; Bayesian Policy Gradient; Bayesian Actor-Critic; Markov Security Games;

    Abstract : A growing problem in network security stems from the fact that both attack methods and target systems constantly evolve. This problem makes it difficult for human operators to keep up and manage the security problem. READ MORE