Essays about: "traffic monitoring in network"

Showing result 1 - 5 of 59 essays containing the words traffic monitoring in network.

  1. 1. Efficient Traffic Monitoring in IoT Networks for Attack Detection at the Edge

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Engla Jansson; [2023]
    Keywords : ;

    Abstract : The Internet of Things has rapidly expanded over the years, and with this comes significant security risks, with attacks increasing at an alarming rate. A way to detect attacks in the network is by having each device send traffic monitoring information to an edge device that can investigate if any devices have been exploited. READ MORE

  2. 2. Investigating the Effectiveness of Stealthy Hijacks against Public Route Collectors : Is AS-Path Prepending Enough to Hide from Public Route Collectors?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Kunyu Wang; [2023]
    Keywords : BGP; BGP Hijack; Stealthy IP prefix hijacking; AS-Path Prepending; BGP monitoring; BGP; BGP Hijack; Stealthy IP prefix hijacking; AS-Path Prepending; BGP-övervakning;

    Abstract : BGP hijacking is a threat to network organizations because traditional BGP protocols were not designed with security in mind. Currently, research to combat hijacking is being done by detecting hijacking in real time from Public Route Collectors. READ MORE

  3. 3. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Keywords : Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Abstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE

  4. 4. Virtualizing and simulating LoRaWAN : An experimental approach to virtualizing and simulating a network environment to stress test a LoRaWAN network.

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Daniel Rodin; [2022]
    Keywords : IoT; LoRa; LoRaWAN; virtualization; simulation; experimental environment; Proxmox; Chirpstack; Lorhammer; Prometheus; Grafana;

    Abstract : The goal of this individual assignment work has been to implement a experimental environment to load and stress test a virtualized LoRaWAN network together with a LoRa simulation tool through the use of open source software. By researching theory and open source software connected to IoT, LoRa, LoRaWAN, virtualization, simulation and monitoring a experimental environment was implemented for launching test scenarios to stress and load test the virtualized LoRaWAN network. READ MORE

  5. 5. Data Trustworthiness Assessment for Traffic Condition Participatory Sensing Scenario

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hairuo Gao; [2022]
    Keywords : Participatory sensing; Data trustworthiness assessment; Anomaly detection; Traffic prediction; Deep neural network; Deltagande avkänning; Bedömning av uppgifternas tillförlitlighet; Upptäckt av anomalier; Trafikprognoser; Djupt neuralt nätverk;

    Abstract : Participatory Sensing (PS) is a common mode of data collection where valuable data is gathered from many contributors, each providing data from the user’s or the device’s surroundings via a mobile device, such as a smartphone. This has the advantage of cost-efficiency and wide-scale data collection. READ MORE