• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 428
  • 49
  • 43
  • 27
  • 23
  • 19
  • 8
  • 5
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 768
  • 234
  • 166
  • 159
  • 154
  • 141
  • 131
  • 89
  • 82
  • 81
  • 80
  • 78
  • 75
  • 74
  • 72
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
371

A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

Adabala, Yashwanth Venkata Sai Kumar, Devanaboina, Lakshmi Venkata Raghava Sudheer January 2024 (has links)
Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. This thesis explores the development of a DDoS attack prevention technique in SDN environments using the Ryu controller application. The research aims to address the vulnerabilities in SDN, particularly focusing on flooding and Internet Protocol (IP) spoofing attacks, which are a significant threat to network security. The study employs an experimental approach, utilizing tools like Mininet-VM (VirtualMachine), Oracle VM VirtualBox, and hping3 to simulate a virtual SDN environment and conduct DDoS attack scenarios. Key methodologies include packet sniffing and rule-based detection by integrating Snort IDS (Intrusion Detection System), which is critical for identifying and mitigating such attacks. The experiments demonstrate the effectiveness of the proposed prevention technique, highlighting the importance of proper configuration and integration of network security tools in SDN. This work contributes to enhancing the resilience of SDN architectures against DDoS attacks, offering insights into future developments in network security.
372

Assessing the correlation between terrorist attacks and the limiting of Muslim immigration due to anti-Islamic sentiments

Okhai, Ratna 01 August 2013 (has links)
In the last 12 years, since the devastating attack on the United States Twin Towers on September 11, 2001, the global community has become increasingly wary. The continuing terrorism on July 7, 2005 on the United Kingdom subway system increased tensions between citizens and immigrants in these countries. I use these two countries to examine the consequences effects that these terrorist attacks have had on, in particular, the Muslim immigrant population. In addition to that, I use Germany as a control, since it has not faced a major terrorist attack, yet has a substantial Muslim immigrant population. In the United States and United Kingdom, I use public opinion data polls and immigration policies before and after the attacks. In Germany's case, I utilize the same data and to assess any correlation to the other two countries data. Using the literature already written, public opinion data polls and policy initiatives enacted before and after these attacks, I examine the overall effect, if any, on the Muslim immigrant population in these countries. The intent of this thesis is to explore if the significant changes in immigration policies after the attacks have occurred due to economic or cultural factors. Because public opinion is central to policy changes, I also consider the implications of public's views on immigration after the attacks, along with the effect all this has on the number of Muslim immigrants entering these countries.
373

Design and Analysis of Anomaly Detection and Mitigation Schemes for Distributed Denial of Service Attacks in Software Defined Network. An Investigation into the Security Vulnerabilities of Software Defined Network and the Design of Efficient Detection and Mitigation Techniques for DDoS Attack using Machine Learning Techniques

Sangodoyin, Abimbola O. January 2019 (has links)
Software Defined Networks (SDN) has created great potential and hope to overcome the need for secure, reliable and well managed next generation networks to drive effective service delivery on the go and meet the demand for high data rate and seamless connectivity expected by users. Thus, it is a network technology that is set to enhance our day-to-day activities. As network usage and reliance on computer technology are increasing and popular, users with bad intentions exploit the inherent weakness of this technology to render targeted services unavailable to legitimate users. Among the security weaknesses of SDN is Distributed Denial of Service (DDoS) attacks. Even though DDoS attack strategy is known, the number of successful DDoS attacks launched has seen an increment at an alarming rate over the last decade. Existing detection mechanisms depend on signatures of known attacks which has not been successful in detecting unknown or different shades of DDoS attacks. Therefore, a novel detection mechanism that relies on deviation from confidence interval obtained from the normal distribution of throughput polled without attack from the server. Furthermore, sensitivity analysis to determine which of the network metrics (jitter, throughput and response time) is more sensitive to attack by introducing white Gaussian noise and evaluating the local sensitivity using feed-forward artificial neural network is evaluated. All metrics are sensitive in detecting DDoS attacks. However, jitter appears to be the most sensitive to attack. As a result, the developed framework provides an avenue to make the SDN technology more robust and secure to DDoS attacks.
374

Representations and Discourse of Torture in Post 9/11 Television: An Ideological Critique of 24 and Battlestar Galactica

Lewis, Michael J. 23 March 2008 (has links)
No description available.
375

GAINING MONITORING CAPABILITIES AND INSIGHTS INTO RESPONSES FROM PHISHING DATA

Raqab, Alah 09 July 2014 (has links)
No description available.
376

High Speed Clock Glitching

Desiraju, Santosh 18 February 2015 (has links)
No description available.
377

Detection of DDoS Attacks against the SDN Controller using Statistical Approaches

Al-Mafrachi, Basheer Husham Ali January 2017 (has links)
No description available.
378

Zero-Knowledge Proof for Knowledge of RLWE (Ring-Learning with Errors) Secret Keys

R V, Saraswathy 07 June 2018 (has links)
No description available.
379

Design Methodology for Differential Power Analysis Resistant Circuits

Manchanda, Antarpreet Singh 21 October 2013 (has links)
No description available.
380

Deployment and Integrity Verification of Streaming IoT Applications on Edge Computing

Lou, Shuangsheng 09 August 2022 (has links)
No description available.

Page generated in 0.0201 seconds