Browsing Computing Dissertations and Theses by Subject "080303 Computer System Security"
Now showing items 1-11 of 11
-
Analysis of L4 DoS/DDoS attacks and mitigation techniques for DNS reflection attack
(2018)Cybersecurity is a very important area that needs to be worked on and improved. Day by day technology becomes closer to human life in many ways. In recent years, especially after the emergence of IoT and cloud computing, ... -
Detecting Sybil attack in mobile wireless sensor networks using observer nodes
(2019)RESEARCH QUESTIONS: What lightweight, scalable algorithm can be developed to detect the Sybil nodes in MWSNs? Then, I broke it to more detailed questions as follows: How many observer nodes would be enough for a ... -
Encryption, storage technology and security of data at rest
(2015-11)The term cryptography is defined as the encryption of sensitive information such as, data, image and others. The cryptographic techniques have changed over the years based on the developments of encryption software and ... -
Evaluating spammer detection systems for Twitter
(2017)Twitter is a popular Social Network Service. It is a web application with dual roles of online social network and microblogging. Users use Twitter to find new friends, update their activities or communicate with each other ... -
Evaluation of WEP, WPA and WPA2 security protocols on 802.11ac client to server WLAN performance
(2016)RESEARCH OBJECTIVE: The key objective of the research is to find out the impact of enabling security protocols on the WLAN performance in a real test bed environment. The research has measured the 802.11ac WLAN performance ... -
A hybrid intelligent intrusion detection system for advanced persistent threats
(2020)RESEARCH MOTIVATION: The objective of this research is to investigate how to increase the detection rate and increase the tracking rate of APT and TA in their early attack phases within an environment of distributed ... -
A multi-agent integrated analysis engine for decentralized network traffic monitoring
(2014)The advent of decentralized systems have been considered as an immense progress as compared to existing centralized systems. In this research, we present an extensible, exible, stable and to the utmost, decentralized network ... -
Performance analysis of defense mechanisms against UDP flood attacks
(2014)A Distributed Denial of Service (DDoS) attack remains one of the most common and devastating security threats to the Internet world. The main purpose of an attack is to disable the use of services on the Internet or the ... -
Performance evaluation of defence mechanisms against ICMPv6 router advertisement flood attacks
(2015)The Internet Protocol version 6 (IPv6) was developed to replace the Internet Protocol version 4 (IPv4). IPv6 provides many improvements over IPv4. However, there are major problems with new features introduced in IPv6, ... -
Security effectiveness of virtual DMZ in private clouds
(2014)Cloud Computing is being considered as emerging technology in recent times and defines a new IT model that delivers the services over internet. Big IT vendors like Google, Microsoft, Yahoo, Amazon and IBM have their own ... -
Virtualization and information security : a virtualized DMZ design consideration using VMware ESXi 4.1
(2012)RESEARCH QUESTION: Is it secure to implement DMZ in a virtual network infrastructure? Sub-questions: How can virtualized DMZs be implemented? Which is the most secure type of virtual DMZ? Which DMZ design ...