Essays about: "thesis on network security"

Showing result 1 - 5 of 329 essays containing the words thesis on network security.

  1. 1. Assessing the Security of Internal Automotive Networks

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Anas Alkoutli; Joakim Anderlind; Carl-Johan Björnson; Mathias Drage; Morgan Thowsen; Antonia Welzel; [2021-09-14]
    Keywords : Vehicle; Network Security; CAN; Ethernet;

    Abstract : Context In order to address the growing need for connectivity in today’s cars, thein-vehicle network has increased in complexity, now consisting of over 100 electricalcontrol units. Balancing the level of security with high performance is non-trivial,and current networks have shown to sacrifice security measures for performance,therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE

  2. 2. A Performance Analysis of Intrusion Detection with Snort and Security Information Management

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Christian Thorarensen; [2021]
    Keywords : Snort; Snort 3; PulledPork; IDS; Open Distro for Elasticsearch; ODFE; SIM; SIEM; ET Open; D-ITG;

    Abstract : Network intrusion detection systems (NIDSs) are a major component in cybersecurity and can be implemented with open-source software. Active communities and researchers continue to improve projects and rulesets used for detecting threats to keep up with the rapid development of the internet. READ MORE

  3. 3. Security Countermeasure Selection as a Constraint Solving Problem

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Aya Kathem; [2021]
    Keywords : Logical attack graph; Optimization problem; Constraint Solving Problems; Computer Network Security.;

    Abstract : Network systems often contain vulnerabilities that remain unmitigated in a network for various reasons, such as lack of a patch and limited budget. Adversaries can exploit these existing vulnerabilities through different strategies. READ MORE

  4. 4. Machine Learning with Reconfigurable Privacy on Resource-Limited Edge Computing Devices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zannatun Nayem Tania; [2021]
    Keywords : Data Privacy; Resource Management; Machine Learning; Fitbit; Internet of Things IoT ; Optimization; Dataintegritet; Resurshantering; Machine Learning; Fitbit; Internet of Things IoT ; Optimering;

    Abstract : Distributed computing allows effective data storage, processing and retrieval but it poses security and privacy issues. Sensors are the cornerstone of the IoT-based pipelines, since they constantly capture data until it can be analyzed at the central cloud resources. However, these sensor nodes are often constrained by limited resources. READ MORE

  5. 5. Network Hardening of Multilayer Switch

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik; Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Peter Pekkanen; David Söderman; [2021]
    Keywords : ;

    Abstract : In today’s computer networking and industrial networking, security holds a significant role in keeping the entire network safe from malicious users or attackers from remote locations. Using vulnerability scanners and a port scanner it is possible to detect vulnerabilities on the network equipment before an attacker finds the vulnerability and exploits it. READ MORE