Search for dissertations about: "Malicious Traffic"
Showing result 1 - 5 of 12 swedish dissertations containing the words Malicious Traffic.
-
1. On Measurement and Analysis of Internet Backbone Traffic
Abstract : In the last decade, the Internet emerged undoubtedly as the key component for commercialand personal communication. The success of the Internet is mainly based on its versatilityand flexibility, allowing for the development of network applications ranging from simpletext based utilities to complex systems for e-commerce and multi-media content. READ MORE
-
2. Towards Understanding the Social Structure of Email and Spam Traffic
Abstract : Email is a pervasive means of communication on the Internet. Email exchanges between individuals can be seen as social interactions between email sender(s) and receiver(s), thus can be represented as a network. READ MORE
-
3. Design Principles for Network Distributed Denial of Service Defense
Abstract : People, organizations and society are become more and more dependent upon access to Information Systems. Most Information Systems are accessible via the Internet. It is becoming easier and easier to perform successful network attacks against these Information Systems, which causes the system to become unavailable for its intended users. READ MORE
-
4. Choreographies and Cost Semantics for Reliable Communicating Systems
Abstract : Communicating systems have become ubiquitous in today's society. Unfortunately, the complexity of their interactions makes them particularly prone to failures such as deadlocked states caused by misbehaving components, or memory exhaustion due to a surge in message traffic (malicious or not). READ MORE
-
5. Mitigating Distributed Denial-of-Service Attacks: Application-defense and Network-defense Methods
Abstract : Distributed Denial of Service (DDoS) attacks can be so powerful that theycan easily deplete the computing resources or bandwidth of the potential targets.Based on the types of the targets, DDoS attacks can be addressed in two levels:application-level and network-level. READ MORE