Essays about: "traffic monitoring in network"
Showing result 1 - 5 of 59 essays containing the words traffic monitoring in network.
-
1. Efficient Traffic Monitoring in IoT Networks for Attack Detection at the Edge
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The Internet of Things has rapidly expanded over the years, and with this comes significant security risks, with attacks increasing at an alarming rate. A way to detect attacks in the network is by having each device send traffic monitoring information to an edge device that can investigate if any devices have been exploited. READ MORE
-
2. Investigating the Effectiveness of Stealthy Hijacks against Public Route Collectors : Is AS-Path Prepending Enough to Hide from Public Route Collectors?
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : BGP hijacking is a threat to network organizations because traditional BGP protocols were not designed with security in mind. Currently, research to combat hijacking is being done by detecting hijacking in real time from Public Route Collectors. READ MORE
-
3. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE
-
4. Virtualizing and simulating LoRaWAN : An experimental approach to virtualizing and simulating a network environment to stress test a LoRaWAN network.
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : The goal of this individual assignment work has been to implement a experimental environment to load and stress test a virtualized LoRaWAN network together with a LoRa simulation tool through the use of open source software. By researching theory and open source software connected to IoT, LoRa, LoRaWAN, virtualization, simulation and monitoring a experimental environment was implemented for launching test scenarios to stress and load test the virtualized LoRaWAN network. READ MORE
-
5. Data Trustworthiness Assessment for Traffic Condition Participatory Sensing Scenario
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Participatory Sensing (PS) is a common mode of data collection where valuable data is gathered from many contributors, each providing data from the user’s or the device’s surroundings via a mobile device, such as a smartphone. This has the advantage of cost-efficiency and wide-scale data collection. READ MORE