Search for dissertations about: "Distributed Denial-of-Service"

Found 5 swedish dissertations containing the words Distributed Denial-of-Service.

  1. 1. Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation

    Author : Zhang Fu; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Data Streaming; Network Security; Overlay; Distributed Denial-of-Service; System Design; DDoS Detection; Distributed Computing;

    Abstract : Distributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the computing resources or bandwidth of the potential targets, by flooding massive packets. Internet infrastructures and network applications, including social services and communication systems for emergency management, are under the threat of the DDoS problem. READ MORE

  2. 2. Mitigating Distributed Denial-of-Service Attacks: Application-defense and Network-defense Methods

    Author : Zhang Fu; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Distributed Denial-of-Service; Network Security; Distributed Computing; System Design;

    Abstract : Distributed Denial of Service (DDoS) attacks can be so powerful that theycan easily deplete the computing resources or bandwidth of the potential targets.Based on the types of the targets, DDoS attacks can be addressed in two levels:application-level and network-level. READ MORE

  3. 3. Design Principles for Network Distributed Denial of Service Defense

    Author : Todd Booth; Karl Andersson; Tero Päivärinta; Antonios Michalas; Luleå tekniska universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; DRDoS; DDoS; Network Security; DSR; Information systems; Informationssystem;

    Abstract : People, organizations and society are become more and more dependent upon access to Information Systems. Most Information Systems are accessible via the Internet. It is becoming easier and easier to perform successful network attacks against these Information Systems, which causes the system to become unavailable for its intended users. READ MORE

  4. 4. Data Integrity and Availability in Power System Communication Infrastructures

    Author : Ognjen Vuković; György Dán; Deepa Kundur; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cyber security; power systems; communications; state estimation; distributed;

    Abstract : Society is increasingly dependent on the proper functioning of electric power systems. Today's electric power systems rely heavily on information and networking technology in order to achieve efficient and secure operation. READ MORE

  5. 5. Securing the Internet of Things with Security-by-Contract

    Author : Alberto Giaretta; Nicola Dragoni; Amy Loutfi; Shahid Raza; Örebro universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES;

    Abstract : Smart homes, industry, healthcare, robotics; virtually every market has seen the uprising of Internet of Things (IoT) devices with different degrees and nuances. IoT devices embody different desirable characteristics, such as mobility, ubiquity, variety, and affordability. READ MORE