Browsing by Subject "460407 System and network security"
Now showing items 1-6 of 6
-
Evaluation of a server under DDOS cyber attack
(2022-12-09)Principle HTTP DDOS Statistics Impact Testbed settings Monitoring - Wireshark Performance metrics Result - TPS (Transactions per second) Result - response time References -
Feature-based systematic analysis of advanced persistent threats
(InTech, 2023-05-22)Advanced Persistent Threats (APT) and Targeted Attacks (TA) targeting high-value organizations continue to become more common. These slow (sometimes carried on over the years), fragmented, distributed, seemingly unrelated, ... -
A new approach for the prevention of sinkhole attack in mobile wireless sensor networks
(2023)RESEARCH QUESTIONS Main research question is: Is it possible to prevent a sinkhole attack on MWSN using a combination of Blowfish and RSA algorithms? Then it was broken down into the following questions: Q1: What would ... -
Penetration testing & mitigation techniques
(2022-12-09)Penetration testing is a security measure used by many organizations to identify and exploit security vulnerabilities within networks and computer systems, allowing organizations to prevent potential attacks. According to ... -
Security analysis and evaluation of Bluetooth technology
(2022-12-09)Overview - Bluetooth technology Implementation - attack stages: obfuscation, surveillance, fuzzer attack, range extension, sniffing, man-in-the-middle, denial of service (DOS), unauthorised direct data access ... -
Wardriving, exploitation and mitigation of security-encrypted wireless networks
(2022-12-09)Problem: how secure the wireless networks are? ; What can we do to make end users savvy about wireless security? Implementation: powerback, GPS dongle, Raspberry Pi 3B+, Alfa adapter Ethical issues Legisla ...