Second level Second level 7. Experimental Design First level Second level 5. Introduction First level Second level 5. References Harvad APA version 6 3
VerifiedAdded on 2022/08/20
|3
|5435
|421
Presentation
AI Summary
Introduction First level Second level Abstract The aim of the poster is to create an experimental design for analysing the traffic of IoT devices with the use of network monitoring tools and identify the source of data traffic. A flooding attack is performed on an IoT device and traffic is analysed for identification of the source of the attack and verification of the integrity of the evidence such that investigation can be performed. Results It can be found from the figure 3 that for the IP address of IPv4 reading 192.168.0.221 the source
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.