Sök:

Sökresultat:

3649 Uppsatser om Distributed Denial of Service - Sida 1 av 244

DDoS : -Vad är det och går det att skydda sig?

This paper will expose the serious phenonomen Distributed Denial of Service (DDoS). Businesses without a good security policy are easy targets for attackers. We will cover why its hard to protect yourself, present previous attacks and ways for individuals and businesses to secure themselves. We have based our paper on previous cases and done intervjues with companies who specialize in dealing with these kind of threats. Then come up with guidelines wich will be helpful for businesses when they want to strengthen there security against Distributed Denial of Service-attacks..

DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon

Internetfenomenet ?Distributed Denial of Service?, förkortat DDoS, beskrivs ofta som ett av de största hoten mot Internet idag. Genom att utnyttja den grundläggande strukturen i kommunikation mellan nätverk och datorer kan kriminella blockera och stänga ute webbplatser och -tjänster från användare, samtidigt som det är mycket svårt för offret och myndigheter att någonsin identifiera den eller de skyldiga. Enorma globala nätverk av ovetande människors infekterade datorer fjärrstyrs till att utföra angrepp mot alla sorters organisationer på Internet med olika motiv, som finansiella, politiska eller för ren vandalism. Syftet med det här arbetet är att göra en dagsaktuell kartläggning över läget kring DDoS-angrepp och titta på statistik över de mest förekommande angreppstyperna, och se om den nyare publicerade forskningen kan svara på de pågående och framträdande trender som kan ses.

Legitimitet och nekande tvångsmakt i Operation Desert Storm

When are aerial bombing strategies effective in coercing target states? According to the recent research debate there is a consensus that denial strategies may be an effective instrument for coercing states to change their politics. This study is based on Belkin?s theory which argues that the effectiveness of denial strategies may depend in part on the domestic legitimacy of the target states? regimes. From a political standpoint, aerial denial effectiveness can be considered more likely to coerce when political leaders of target states lack domestic legitimacy rather than when they are legitimate.   The purpose of this study is to contribute an explanation of a condition where denial strategies are more likely to succeed.

Migration av distribuerad relationsdatabas för lagring i webbläsare

An increasing amount of companies and organizations are starting to implement the use of cloud computing in their business. This trend results in that software, which was previously sold and distributed to the customers whom then had to install the software on their own computers, now is being replaced with Software as a Service (SaaS). SaaS makes software available through the customers? browsers, which results in that the service providers only have to administer a single application. The process to migrate a distributed application to a service delivered as a SaaS lacks sufficient investigation; this paper will provide some guidelines for conducting such a pro- cess.

Kanal 1 i Kanal5? : En kvantitativ studie om studenters attityder gentemot att public service utför marknadskommunikation

In recent years, the digitalization and media convergence has increased, which has made the market for public service- medias more competitive. Perhaps this is why public service has chosen to communicate with recipients outside their own channels.The purpose of this quantitative study is to find out how students attitudes looks towards the fact that public service are performing marketing communication. To find out, we conducted a survey, as 256 students of Linnaeus University in Kalmar answered. Together with the study we have used different theoretical references in order to analyse the responses from the survey, and obtain our conclusions.By analysing the empirical material we came to the conclusion that the majority are in favour of public service performing communication outside its own channels. But we also noticed that the communication needs to be in a certain way for the students to be positive.

Utveckling av en webbaserad donationstjänst för företag  som involverar medarbetarna i processen

In recent years, employees at large companies have started to demand that their employer should work more for good causes. The money the company wants to donate to charity is distributed mostly through a vote to decide where the money will be remitted. The purpose of this design case is to develop a design concept for a web-based donation service that involves all employees at a company. Furthermore, the authors of this study intends to explore how the motivation for employees of a company can be affected by participation in this service. In this design case, the service function, quality and concept was tested and evaluated.

Det virtuella kontoret : En litteraturstudie i möjligheter och utmaningar med att använda 3D kollaborativa virtuella miljöer inom distribuerad systemutveckling

Distributed system development is a common occurrence in today?s technological and global world. Because the consequences of its geographically distributed nature it creates barriers between people that affects their communication and collaboration efforts in the distributed context. Despite a lot of technological breakthroughs over the last decades and the occurrence of video-conference applications and other tools for communication and collaboration, cultural and geographical issues have so far not yet been completely resolved. In this study I have made a literature study over distributed system development to form a set of central factors that affects the distributed development process.

Service för funktionshindrade: En undersökning av Boken kommer verksamheten och några användares upplevelser av servicekvalitet

The aim of this Masters thesis is to examine how disabled people who receive the shut-in-service in one community define service quality. The purpose is also to examine the shut-in-service and to look at the users' context. Answers are sought to the following questions: - How do users experience the service quality of the shut-in-service? - What kind of service does the shut-in-service offer to the user? - How can the user be described and which are his/her requests? The analysis is based on theory about service quality by Christian Grönroos. The theory makes a distinction between two kinds of service quality, technical vs functional quality, as experienced by the user through the profile of the organization.

Klimatfrågan i dagspressen : En analys av den bild svenska dagstidningar förmedlar genom sina ledarartiklar när det gäller klimatförändringarna

ABSTRACTClimate Change in the Daily PressAn Analysis of the Representation Swedish Daily Papers Convey Through Their Editorials About the Climate ChangeThe purpose of this essay is partly to present how swedish daily papers describe the climate change through their editorials and partly to examine if their politcal affiliation effect their point of view about the climate change. The search incluedes editorials from 6 daily papers (Aftonbladet, Dagens Nyheter, Expressen, Göteborgstidningen, Nerikes Allehanda and Svenska Dagbladet) from the year 1997 to the year 2003. Three discourses and the order between them, found by a former analysis (Adger and others, 2001) of the international politics of climate change, are used as types of ideal in a form of an analysis of idea.The analysis reveals that the swedish daily papers don?t give the problem any major attention. Only a total of 65 editorials about the climate change could be found even though the papers produces several thousands during the period.

Genomgång av skyddsmetoder för TCP SYN flooding

Följande arbete behandlar möjliga lösningar för hantering av SYN flooding, en Denial-of-Service-attack mot tjänster som använder TCP för kommunikation över datanätverk. Ett flertal olika skyddsmetoder, med varierande ansatser, identifieras, beskrivs och undersöks. Även möjligheter att kombinera dessa analyseras. Det visas att genom att implementera existerande skydd, samt kombinera flera av dessa begränsas hotet från SYN flooding avsevärt. Rekommendationer presenteras dessutom för hur organisationer bör gå tillväga för att säkra tjänster som riskerar att utsättas för SYN flooding-attacker genom att implementera skydd nära tjänsten först  samt  därefter ytterligare lager allt längre ut i nätverket..

Service branding : en studie av vad som präglar varumärken inom tjänsteföretag

Service branding is a subject that has been excluded from the traditional branding theory. Our main purpose with this paper is to distinguish what characterizes service branding. To do this, we have looked in to both service marketing theory as well as branding theory. We have also looked at the existing theory concerning service branding. Six qualitative interviews have been performed to explain what characterizes service branding.

Tryck här för sanningens ögonblick: Automatiserade och mänskliga servicemöten i komplexa tjänsteleveranser

As self-service technologies become more common in service provisions, a deeper understanding is needed of how customer satisfaction is affected by automated service encounters. Drawing from theories of customer satisfaction, human interaction, and the dynamics of complex service provisions, the differences between automated and interpersonal service encounters in the initial part of a service provision are examined in terms of customers? evaluation of the service encounter itself, overall satisfaction, as well as the service encounter?s impact on global evaluations and evaluations of other non-dependant service encounters. The study was performed on people travelling by air on Swedish domestic routes. Passengers were asked to evaluate the airline?s performance on different attributes of the air travel they had undertaken, as well as to form an overall evaluation of the service.

Hantering av QoS i Distribuerade MPEG-videosystem

With the advance in computer and network technologies, multimedia systems and Internet applications are becoming more popular. As broadband network is prevailing, more clients are able to watch streaming videos or to play multimedia data over the Internet in real-time. Consequently, there is an increasing demand in the Internet for streaming video systems. As the run-time environment of such applications tends to be dynamic, it is imperative to handle transient overloads effectively. The goal of this work is to develop an algorithm that would provide a robust and controlled behavior of the video system so that important data is delivered on time to the video clients.

Nekande tvångsmakt i Operation Unified Protector

There are several competing views on how to best utilize air power. Following his quantitative study of air power, Robert Pape developed a theory which focuses on undermining the target state's military strategy. According to Pape it is possible to explain the outcome as a result of military vulnerability. This essay seeks to determine if Pape's theory can predict the outcome of Operation Unified Protector. By using a mixed methods approach on four hypotheses, it will be determined if the operation was a successful case of coercion, if NATO acted according to Pape's model and whether this achieved the desired effects or not. The results reveal that the theory could not successfully predict the outcome of the conflict.

Data Propagation and Self-Configuring Directory Services in a Distributed Environment

The Swedish field of digital X-ray imaging has since several years relied heavily on distributed information systems and digital storage containers. To ensure accurate and safe radiological reporting, Swedish software-firm eCare AB delivers a system called Feedback?the first and only quality assurance IT support product of its kind. This thesis covers several aspects of the design and implementation of future versions of this software platform. The focus lies on distributed directory services and models for secure and robust data propagation in TCP/IP networks.

1 Nästa sida ->