Essays about: "thesis for NETWORK SECURITY"
Showing result 36 - 40 of 456 essays containing the words thesis for NETWORK SECURITY.
-
36. Fog detection using an artificial neural network
University essay from Lunds universitet/Matematisk statistikAbstract : This project studies a method of image-based fog detection directly from a camera without using the transmissometer. Fog can be detected using transmissometers which could be a very costly approach. This thesis presents an image-based approach for fog detection using Artificial Neural networks. READ MORE
-
37. Securing Real Estate: Wireless Integration and Device Security
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : For decades, wired systems have been utilized when connecting operational technology devices to internal real estate systems. With the advancement of new technologies, there is a growing trend toward wireless communication in this domain, necessitating further research and exploration. READ MORE
-
38. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE
-
39. Investigating the Effectiveness of Stealthy Hijacks against Public Route Collectors : Is AS-Path Prepending Enough to Hide from Public Route Collectors?
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : BGP hijacking is a threat to network organizations because traditional BGP protocols were not designed with security in mind. Currently, research to combat hijacking is being done by detecting hijacking in real time from Public Route Collectors. READ MORE
-
40. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE