Advanced search

Showing result 1 - 5 of 33 essays matching the above criteria.

  1. 1. Performance evaluation of VPN solutions in multi-region kubernetes cluster

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Bharani Kumar Yedla; [2023]
    Keywords : Kubernetes; Docker; Virtual Private Network; Wireguard; OpenVPN; SoftEther; Tinc; ZeroTier; Performance evaluations;

    Abstract : Containerization is widely recognized as a form of lightweight virtualization in the cloud. Due to its reliability, maturity, and rich capabilities, kubernetes has established itself as the de-facto standard for deployments and maintenance of containers. READ MORE

  2. 2. Cybersecurity in home-office environments : An examination of security best practices post Covid

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Robin Klint; [2023]
    Keywords : ;

    Abstract : The rapid growth of remote work has brought new challenges in ensuring cybersecurity in home-office environments. Based on a structured literature review and semi-structured interviews with industry professionals, this study investigates and identifies cybersecurity best practices for home-office environments post Covid and aims to fill existing research gaps by providing valuable new insights. READ MORE

  3. 3. Towards Realistic Datasets forClassification of VPN Traffic : The Effects of Background Noise on Website Fingerprinting Attacks

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Christoffer Sandquist; Jon-Erik Ersson; [2023]
    Keywords : Data collection; Website fingerprinting; dataset; traffic analysis; VPN; encrypted traffic; machine learning; deep learning; network measurements; twitch; Datainsamling; Profilering av hemsidor; dataset; trafikanalys; VPN; krypterad trafik; maskininlärning; djupinlärning; nätverksmätningar; twitch;

    Abstract : Virtual Private Networks (VPNs) is a booming business with significant margins once a solid user base has been established and big VPN providers are putting considerable amounts of money into marketing. However, there exists Website Fingerprinting (WF) attacks that are able to correctly predict which website a user is visiting based on web traffic even though it is going through a VPN tunnel. READ MORE

  4. 4. Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Lukas Einler Larsson; Kushtrim Qollakaj; [2023]
    Keywords : Cybersecurity; Remote work; VPN; Exploit; Hardening;

    Abstract : Background. The pandemic outbreak commenced a large migration of employees from all kinds of industries from previously working in an industrial or office environment to working from home. The remote migration allowed many kinds of work to continue as usual even during a pandemic. READ MORE

  5. 5. The Effect Background Traffic in VPNs has on Website Fingerprinting

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Gustav Rehnholm; [2023]
    Keywords : Website Fingerprinting; Virtual Private Network; Deep Learning; Mönsterigenkänning; Virtuellt Privat Nätverk; Djup Inlärning;

    Abstract : Tor and VPNs are used by many to be anonymous and circumvent censorship on the Internet. Therefore, traffic analysis attacks that enable adversaries to link users to their online activities are a severe threat. READ MORE