Advanced search

Showing result 1 - 5 of 32 essays matching the above criteria.

  1. 1. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Keywords : Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Abstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE

  2. 2. Deterministic Performance on Kubernetes

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Chetan Kandya; [2023]
    Keywords : Kubernetes; Deterministic Performance; Core Isolation; IDO; Intent Driven Orchestration; CRI-RM; Docker; Cloud Optimization;

    Abstract : With the exponential growth of virtualization and cloud computing over the last decade, many companies in the telecommunications sector have started their journey towards cloud migration by exchanging a lot of specialized hardware for virtualized solutions. With more and more applications running in a cloud environment, it became essential to run these applications on heterogeneous systems with shared underlying hardware and software resources. READ MORE

  3. 3. Latency Aware SmartNIC based Load Balancer (LASLB)

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : shivanand kadwadkar; [2021]
    Keywords : Load balancer; smartNIC; hardware; latency;

    Abstract : In the 21th century, we see a trend in which CPU processing power is not evolving at the same pace as it did in the century before. Also, in the current generation, the data requirements and the need for higher speed are increasing every day. This increasing demand requires multiple middlebox instances in order to scale. READ MORE

  4. 4. Tracing Control with Linux Tracing Toolkit, next generation in a Containerized Environment

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Vikhram Ravi; [2021]
    Keywords : 5g; ran; kubernetes; docker; tracing; observability; troubleshooting; service discovery; lttng;

    Abstract : 5G is becoming reality with companies rolling out the technology around the world. In 5G,the Radio Access Network (RAN) is moving from a monolithic-based architecture into a cloud-based microservice architecture for the purpose of simplifying deployment and manageability,and explore scalability and flexibility. READ MORE

  5. 5. Evaluating Service Mesh as a Network Monitoring Solution

    University essay from Lunds universitet/Institutionen för datavetenskap

    Author : Elias Frykholm; Ennio Mara; [2021]
    Keywords : Kubernetes; Service Mesh; Istio; Network Monitoring; Distributed Systems; Containers; Technology and Engineering;

    Abstract : Modern software systems often utilize a distributed architecture, which uses the network as the communication channel. This results in the system being dependent on the network performance to behave as expected. The network performance varies, and network faults can occur, which may negatively affect the system. READ MORE