Essays about: "wireshark"
Showing result 1 - 5 of 28 essays containing the word wireshark.
-
1. Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. READ MORE
-
2. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE
-
3. Implementation and evaluation of a secure communication solution for drones in a ROS2 network application
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : In recent time, drones are everywhere. While commercial drones have shown great potential for hobby enthusiasts, it has shown a greater potential in military use and safeguarding. Currently, a significant amount of drones are being used for malicious means, such as espionage and warfare. Because of this, these drones has to be combated. READ MORE
-
4. Towards Realistic Datasets forClassification of VPN Traffic : The Effects of Background Noise on Website Fingerprinting Attacks
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Virtual Private Networks (VPNs) is a booming business with significant margins once a solid user base has been established and big VPN providers are putting considerable amounts of money into marketing. However, there exists Website Fingerprinting (WF) attacks that are able to correctly predict which website a user is visiting based on web traffic even though it is going through a VPN tunnel. READ MORE
-
5. Virtualizing and simulating LoRaWAN : An experimental approach to virtualizing and simulating a network environment to stress test a LoRaWAN network.
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : The goal of this individual assignment work has been to implement a experimental environment to load and stress test a virtualized LoRaWAN network together with a LoRa simulation tool through the use of open source software. By researching theory and open source software connected to IoT, LoRa, LoRaWAN, virtualization, simulation and monitoring a experimental environment was implemented for launching test scenarios to stress and load test the virtualized LoRaWAN network. READ MORE