Haku
Viitteet 1-4 / 4
Analysis of approaches to Internet traffic generation for cyber security research and excercise
(Springer, 2015)
Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. ...
On Application Layer DDoS Attack Detection in High-Speed Encrypted Networks
(Advanced Institute of Convergence IT, 2016)
Application-layer denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed by using legitimate ...
Refining Cyber Situation Awareness with Honeypots in Case of a Ransomware Attack
(Springer, 2024)
The cyber threat landscape is vast and unstable. One of the top threats in the present moment is ransomware, which is constantly spreading in prevalence. To protect organisations’ cyber operating environment, ability to ...
Distribution of Invalid Users on an SSH Server
(Springer, 2024)
The Secure Shell (SSH) server on a Unix-like system is a viable way for users to login and execute programs on the system remotely. Remote access is something that hackers also want to achieve, making SSH servers a target ...



