Ddos attacksdela

Filtriraj

Moja nedavna iskanja
Filtriraj po:
Proračun
do
do
do
Vrsta
Znanja
Jeziki
    Delovno mesto
    2,000 ddos attacks najdenih del, po cenah EUR
    Expert Crypto Technician for Hire 6 dni left
    VERIFICIRAN/A

    I am currently seeking a highly experienced cryptocurrency technician to manage the entirety of my hosting needs. This role will involve not just the set-up of my hosting, but also its ongoing maintenance and troubleshooting. The ideal candid...provide robust security measures and effective monitoring of the system. Key requirements include: - Expertise in cryptocurrency technologies, with a proven track record of past work in similar projects. - Ability to set up and install new hosting systems, as well as maintain and troubleshoot existing systems. - Strong security skills, including the ability to anticipate and prevent potential attacks or breaches. - Experience in monitoring systems and responding to incidents promptly and effectively. Let’s Make money together serious ...

    €479 (Avg Bid)
    €479 Povprečna ponudba
    77 ponudb

    My project aims at developing measures to counter Zombieload side channel attacks. As techniques evolve, it's absolutely crucial to remain steps ahead of potential threats. Based on this, I am particularly interested in: - Creating a robust detection model using both hardware and software. - Utilizing distinct technologies, including Intel Performance Unite and Machine Learning algorithms as primary tools for model development. (Python, Tenser flow, Perf Linux, python PAPI) - This model will also include the analysis of Hardware Performance counters. The potential freelancer should possess a strong understanding of these tools along with expertise in cybersecurity and the development of prevention measures. A background in using network monitoring tools is also an advantage....

    €122 (Avg Bid)
    €122 Povprečna ponudba
    17 ponudb

    My project aims at developing measures to counter Zombieload side channel attacks. As techniques evolve, it's absolutely crucial to remain steps ahead of potential threats. Based on this, I am particularly interested in: - Creating a robust detection model using both hardware and software. - Utilizing distinct technologies, including Intel Performance Unite and Machine Learning algorithms as primary tools for model development. (Python, Tenser flow, Perf Linux, python PAPI) - This model will also include the analysis of Hardware Performance counters. The potential freelancer should possess a strong understanding of these tools along with expertise in cybersecurity and the development of prevention measures. A background in using network monitoring tools is also an advantage....

    €93 (Avg Bid)
    €93 Povprečna ponudba
    10 ponudb

    I'm seeking a professional researcher to develop a comprehensive research paper exploring the effectiveness of AI methods against multiple cyber threats in cloud environments. Here’s what I have in mind: • Focusing on the following cyber threats: - Data Breaches - Identity Theft - Malware Attacks • The research should incorporate AI methods: - Machine Learning - Deep Learning In the depth of your research, scrutinize the role of these AI methods; indicate their strengths, weaknesses and how they could mitigate the mentioned threats. Ideal Skills: • Solid understanding of Cloud Technologies • Deep knowledge of AI, machine learning, deep learning • Proficient with Research/Writing • Familiarity with cyber threats...

    €20 / hr (Avg Bid)
    €20 / hr Povprečna ponudba
    44 ponudb

    ...devices (desktop, mobile, tablet). Secure and reliable platform. 2. Easy navigation allows users to find the information they need. 3. The website page should be designed as per the prototype prepared on our side. The prototype shall include Images and Content for the website. 4. The project includes Database configuration and setup. 5. Security features that defend the website against brute force attacks and malware infection will be configured and set up. 6. Sitemap configuration 7. WhatsApp floating icon integration Pages on the website: It is required to develop approximately 10 (ten) pages for the website. Content in General: 1. Introduction 2. About Us 3. Access to the knowledge base 4. Support 5. Location 6. Pricing 7. Training 8. Webinar Websites for reference (Simil...

    €12 / hr (Avg Bid)
    €12 / hr Povprečna ponudba
    14 ponudb

    I'm looking for a highly skilled machine learning expert to develop a solution that leverages supervised learning techniques to detect different types of side channel attacks . The solution should ideally be capable of adapting to various datasets. Key Responsibilities: - Development of detection model using supervised learning. - The model should be designed to adapt and learn from different datasets. - collecting data from Hardware level Ideal Skills & Experience: - Expertise in Machine Learning is mandatory, specifically in supervised learning techniques. - A strong understanding of cybersecurity and side channel attacks is required. - Familiarity with various datasets and hands-on experience in working with them. - A strong understanding of Microarchitecture...

    €439 (Avg Bid)
    €439 Povprečna ponudba
    30 ponudb

    University Assignment: Flask Web Application for Secure Authentication System ONLY BID IF YOU CAN DO IT. Go to Template Folder to see the code and use Docker to run it. It should take 2-3 hours to do it. Need it ASAP. Project O...authentication (2FA) using a popular service like Google Authenticator. - Enforce session security with HTTPS and consider HTTP Strict Transport Security (HSTS) for enhanced security. - Implement CAPTCHA verification to prevent automated attacks and manage session rate limiting effectively. Recovery Options: - Generate recovery keys using () with at least 20 bits of entropy. - Ensure recovery keys are delivered securely and are single-use. - Hash recovery keys using Argon2 with individual salts. - Explore implementing HSTS to prevent downgrade attac...

    €22 (Avg Bid)
    €22 Povprečna ponudba
    36 ponudb

    I have a AWS Infrastructure setup project requiring expertise in Cloudfront NLB and protection using WAF. As the goal is targeted at content distribution and load balancing, proficiency in these areas is ...access website on EC2 IIS with custom ports like 8080, 5440 etc and not standard 80 or 443. User will be providing url with port number and on IIS different website is binded with different port number. For WAF, protective measures against DDoS attacks, SQL injections, and XSS attacks are necessary. Thus, an understanding of these areas is also needed. Skills and experience: - Proficient in AWS services (Amazon EC2, ELB, Cloudfront and Amazon S3) - Knowledge of Cloudfront NLB - Experience with WAF - Understanding of DDoS attacks, SQL injections, and...

    €138 (Avg Bid)
    €138 Povprečna ponudba
    32 ponudb

    ...add excessive bloat. 2.4 - Use a CDN to distribute the load, reduce latency, and improve the speed of content delivery globally. 2.5 - Regularly clean the database to remove unnecessary data and keep the website running smoothly. 3. Security Measures 3.1 - Implement SSL certificate. 3.2 - Install and configure a reputable security plugin to protect against common threats, such as brute force attacks, malware, and hacks. 3.3 - WordPress theme should not be without license 3.4 - Regular backup plugin should be added 4. Testing and Quality Assurance 4.1 - We will check compatibility and responsive design before handover. 4.2 - Website should be 95% + compatible and good as per GTmetrix and Google PageSpeed Insights and we will not take handover until and unless these terms are m...

    €297 (Avg Bid)
    €297 Povprečna ponudba
    92 ponudb

    I require a reliable and experienced developer to assist me in implementing a Content Security Policy (CSP) in my JavaScript application. Key Details: - Purpose: The primary goal of this CSP implementation is to prevent Cross-Site Scripting Attacks within the application. - Target Sources: The CSP should be configured to allow only self-hosted scripts and elements. These are specified in the file. - Application Language: The application is developed in JavaScript. Your Responsibilities: - Review the current application setup and assess the specific requirements for the CSP. - Implement the CSP accordingly, ensuring that only self-hosted scripts and elements are permitted. - Integrate the CSP seamlessly with the existing application architecture, ensuring no disruptions in functi...

    €11 (Avg Bid)
    €11 Povprečna ponudba
    13 ponudb

    ..."extract live" from each specific site all the games/slots on their site, and include game picture, description, etc. - will also show user ratings for each game (to rate and/or review a game you must create a account then you will be able to rate games and leave reviews for game *possibly to require entering a bet id to post a review?* **and some sort of prevention/security to prevent types of attacks with bots or other methods to skew ratings** - ability to sort games, top rated, most reviewed, most discussed, etc. - a type of forum, chat, or comment section(s) where discussion can be shared Tips, methods, winnings, losings, rants, raves, etc. - user system to include a ranking/leveling profile that will level up/rank up the more that you post, rate, review, etc. T...

    €1279 (Avg Bid)
    €1279 Povprečna ponudba
    125 ponudb
    System Security Specialist Required 2 dni left
    VERIFICIRAN/A

    We recently experienced a malware attack on our system and we're seeking an expert who can ensure this doesn't happen again in the future. We don't require data recovery services; our main priority is to make sure it never happens again. Ideal candidates should possess: - In-depth experience in counteracting malware attacks - Mastery in various security domains such as network, application, and endpoint security - Proven track record in enhancing system security

    €120 (Avg Bid)
    €120 Povprečna ponudba
    19 ponudb

    I'm urgently looking for a skilled professional to help me secure my website against DDoS attacks, specifically focusing on DNS amplification. work over any disk only must be now !

    €44 (Avg Bid)
    €44 Povprečna ponudba
    50 ponudb

    I am in need of a proficient security expert to help tackle my final project geared towards creating a low-interactive honeypot. This honeypot is intended to guard real networks by focusing on detection of Brute Force Attacks specifically. The honeypot should be designed for the Linux operating system and created to effectively emulate SSH. I require that you have: 1. the built should be on CML 2. Skill in SSH protocol 3. Experience in creating low-interactive honeypots 4. The ability to focus on detecting Brute Force Attacks 5. Should specific documentation design, developments, and testing : Chapter 4 — Design 4.1 Introduction 4.2 Interface Design 4.3 System Design 4.4 Summary -------------------- Chapter 5 — Development 5.1 Introduction 5.2 Interface De...

    €178 (Avg Bid)
    €178 Povprečna ponudba
    4 ponudb

    ...Verification Existing PoS (Point of Sale) based payment frameworks are vulnerable as the Payment Application’s integrity in the smart phone and PoS are compromised, vulnerable to reverse engineering attacks. In addition to these existing PoS (Point of Sale) based payment frameworks do not perform point-to-point encryption and do not ensure communication security. We propose a Smart and Secure PoS (SSPoS) Framework which overcomes these attacks. Our proposed SSPoS framework ensures point-to-point encryption (P2PE), Application hardening and Application wrapping. SSPoS framework overcomes repackaging attacks. SSPoS framework has very less communication and computation cost. SSPoS framework also addresses Heartbleed vulnerability. SSPoS protocol is successfully v...

    €132 (Avg Bid)
    €132 Povprečna ponudba
    8 ponudb

    Seeking a diligent, research-minded writer to explore the intricate world of asthma fo...“you”), and verb tense shifts. (Get a friend’s perspective.) Fix them. What are the main activities and activators that cause asthma problems and asthma attacks to many people like me and how can it be minimized. I have chosen this topic because I personally struggle with asthma, and I have started to overcome it in little steps at a time. I definitely have a long way to go but from where I'm at now compared to 6 years ago is night and day. I can include that asthma is a genetic disease, but it can be controlled with different exercises and how it can be traumatic. I hope to discover the main triggers and activators of asthma and asthma attacks to people. I wan...

    €116 (Avg Bid)
    €116 Povprečna ponudba
    57 ponudb

    ...data scientist or machine learning engineer to develop a model for classifying various types of attacks on a KDD dataset. The ideal candidate will have extensive knowledge in the use of autoencoders for feature extraction and GRU models. Key project elements include: * Professionals will need to implement an autoencoder for feature extraction with the core goal of reducing data dimensionality. Prior experience in working with high-dimensional data and in deploying autoencoders is necessary. * Subsequently, the system built should be capable of classifying Denial of Service (DoS), User to Root (U2R), and Probe attacks within the KDD dataset. Good working knowledge of GRU models and the mentioned attacks is required. * The project includes steps to ensure the accurac...

    €32 (Avg Bid)
    €32 Povprečna ponudba
    8 ponudb

    ...functionality to be accessible both as an app and a website. The app should be compatible with both Android and iOS platforms, thus requiring proficiency in cross-platform app development. Key quantum encryption technologies for integration include: - Quantum Key Distribution (QKD): To ensure secure encryption keys are used. - Quantum Side-Channel Attacks Protection: To ensure robust defense mechanisms against potential quantum attacks. - Quantum Secure Direct Communication (QSDC): To allow direct transfer of cryptocurrency without risk of eavesdropping. Proficiency in blockchain technology, cryptocurrency, quantum encryption, cross-platform mobile app development, and web development are essential for this project. Successfully delivering on this project will r...

    €4331 (Avg Bid)
    €4331 Povprečna ponudba
    32 ponudb

    I'm on the hunt for a skilled blockchain developer who can create a cryptocurrency token based on the Binance Smart Chain for me. Key responsibilities would include: - Designing and implementing the token based on the ERC-20 Standard. - Ensuring the utmost security measures are in place to prevent any potential attacks. - Testing the token to assure smooth navigation and error-free functionality. Since it's a cryptocurrency token development task, freelancers who have profound knowledge and previous involvement in blockchain technology and the Binance Smart Chain specifically would be ideal. Expert-level capability in the creation and deployment of ERC-20 standard tokens is crucial too. If you possess these skills, I'd love to hear more about your previous exper...

    €781 (Avg Bid)
    €781 Povprečna ponudba
    24 ponudb

    I'm looking for a skilled professional to conduct a network security test on our workstations using...vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someone with significant experience and expertise in network security testing to ensu...

    €60 (Avg Bid)
    €60 Povprečna ponudba
    15 ponudb

    I'm looking to modify the SAAS-BOILERPLATE open-source project to create an interactive membership website for indie filmmakers and film students. NOTE...and AWS as well as SVG animations - A HTML5/css introduction page implemented as a responsive design ready for webdesigner collaboration (squarespace has an interesting version that is attached below to the project) IDEAL FREELANCER PROFILE: - Have previous experience with backend development using Laravel PHP - security-focused emphasis on security against attacks on webapps - experience minimizing the attack surface of webapps - Understand how to integrate video hosting in SaaS

    €516 (Avg Bid)
    Izpostavljeno
    €516 Povprečna ponudba
    65 ponudb

    I am seeking a skilled freelancer to help me create a data collection tool for an intrusion detection system. This system's main purpose is to collect data for analysis, focusing on network traffic. Key ta...detection system. This system's main purpose is to collect data for analysis, focusing on network traffic. Key tasks include: - Designing a new normal and attack dataset using Mininet WiFi - The focus is on detecting Denial of Service (DoS) and Man-in-the-Middle (MitM) attacks Ideal candidates should have experience: - Building intrusion detection systems - Working with Mininet WiFi - Handling network traffic data - Familiarity with DoS and MitM attacks This tool will greatly aid in identifying and preventing future network attacks by providing stru...

    €330 (Avg Bid)
    €330 Povprečna ponudba
    3 ponudb

    I'm in need o...black-box penetration testing on a WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are crucial for ...

    €88 (Avg Bid)
    €88 Povprečna ponudba
    29 ponudb

    I'm in need of an hack...penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are crucial for ...

    €305 (Avg Bid)
    €305 Povprečna ponudba
    23 ponudb

    Prosimo, vpišite se ali se prijavite za več podrobnosti.

    Izpostavljeno Nujno Zapečateno

    ...add excessive bloat. 2.4 - Use a CDN to distribute the load, reduce latency, and improve the speed of content delivery globally. 2.5 - Regularly clean the database to remove unnecessary data and keep the website running smoothly. 3. Security Measures 3.1 - Implement SSL certificate. 3.2 - Install and configure a reputable security plugin to protect against common threats, such as brute force attacks, malware, and hacks. 3.3 - WordPress theme should not be without license 3.4 - Regular backup plugin should be added 4. Testing and Quality Assurance 4.1 - We will check compatibility and responsive design before handover. 4.2 - Website should be 95% + compatible and good as per GTmetrix and Google PageSpeed Insights and we will not take handover until and unless these terms are m...

    €313 (Avg Bid)
    €313 Povprečna ponudba
    124 ponudb

    I am looking for a certified ethical hacker (CEH) and pentester. The main objectives of the project are to identify vulnerabilities, assess the overall security, and develop countermeasures to prevent attacks. Scope of the project will involve: - Scanning and analyzing network infrastructure - Testing and exploiting our web applications - Conducting a social engineering assessment The ideal candidate should have a proven track record in cybersecurity and be able to demonstrate their expertise in identifying vulnerabilities and implementing effective security measures.

    €212 (Avg Bid)
    €212 Povprečna ponudba
    11 ponudb

    My WordPress website has been flagged by Avast as potentially having malware. It's imperative that I get a professional to check and remove any malware as soon as possible. Key responsibilities: - Conduct a thorough check of the WordPress site and server for viruses, Trojans, and/or spyware - Remove any identified malware - Implement security measures to prevent future attacks Ideal Skills and Experience: - Proven experience in cleaning WordPress sites from malware - In-depth knowledge of various types of malware - Familiarity with Avast and other antivirus software - Strong understanding of WordPress security protocols and best practices Please bid only if you can start immediately and have a track record of success in similar projects.

    €118 (Avg Bid)
    €118 Povprečna ponudba
    171 ponudb

    ...developer, with strong proficiency in developing dynamic, engaging, and user-friendly business websites, primarily centered around information technology services. Key Areas: - Showcase Services: Foremost, the website should beautifully present my key services which are Cybersecurity Managed Solutions ,Vulnerability Assessment and management, disaster recovery as a service, SOC as a service, DDoS mitigation, penetration testing, cloud computing security, and Incident Response. - Lead Generation: A flawless mechanism for capturing leads and inquiries is essential. Thus, effective CTAs, contact forms, and pop-ups, etc., should be correctly integrated. - Website Features: The website must feature video content to grab the attention of the viewer, must feature case studies, cl...

    €448 (Avg Bid)
    €448 Povprečna ponudba
    116 ponudb

    I'm looking for a network specialist to set up my pfsense for public subnet, prioritizing network security. Specifically, my main concerns are: - Malware attacks - Distributed Denial of Service (DDoS) attacks - Intrusion attempts The setup should be designed to accommodate more than 50 connected devices. The ideal freelancer for this project should have advanced knowledge and experience in network security, specifically in dealing with the aforementioned threats. A strong background in pfsense setup and load balancing is also essential.

    €157 (Avg Bid)
    €157 Povprečna ponudba
    9 ponudb

    ...credit card mass attempt attacks on my ecommerce site. I have already implemented SSL certificate, Firewall, CVD, and recapcha as security measures, as well equipped my site with stricter user authentication. However, despite these measures, the issue persists. I am looking for a highly skilled professional with a strong background in ecommerce cybersecurity: - Expertise in designing and implementing robust ecommerce security protocols - Experience in guarding against credit card mass attempt attacks - Strong knowledge of SSL certificates, Firewalls, CVD, recapcha and more - Experience with advanced user authentication mechanisms The successful freelancer will need to conduct a security audit, identify loopholes, and strengthen security to stop these attacks...

    €16 / hr (Avg Bid)
    €16 / hr Povprečna ponudba
    58 ponudb

    ...key requirements for this project include: 1. Security Enhancements: - Encryption of data; implementing a powerful encryption mechanism to shield sensitive data - Authentication and authorization; setting up a robust security system to authenticate users and authorize necessary permissions - Protection against SQL Injection; applying various techniques to guard against SQL injection attacks, ensuring database security 2. Efficient Data Load Management: - The APIs should be designed to fetch data as needed from the MySQL database, ensuring fast and efficient loading to uphold user experience 3. Data Handling: - The REST APIs will primarily handle JSON data, thus proficiency in handling, parsing and manipulating JSON data is critical The ideal candidate should...

    €25 (Avg Bid)
    €25 Povprečna ponudba
    12 ponudb

    ...to support their kingdom's growth and military endeavors. Different regions within the game world will offer unique types of resources, encouraging trade and strategic expansion. Military Conquest: Players can recruit and train various types of military units, each with unique strengths and weaknesses. Military units can be used for attacking other players' kingdoms, defending against incoming attacks, or raiding resource-rich locations. Diplomacy and Alliances: Players can form alliances with other players to establish diplomatic relations, trade resources, and coordinate military strategies. Alliances will play a crucial role in the game, allowing players to achieve goals collectively and defend against common threats. Research and Technology: Players can invest in...

    €9496 (Avg Bid)
    €9496 Povprečna ponudba
    54 ponudb

    Prosimo, vpišite se ali se prijavite za več podrobnosti.

    Izpostavljeno Zapečateno Top natečaj Pogodba o nerazkritju informacij

    I'm seeking...able to log in/out, (ii) change password, (iii) be able to add new users/customers with least privileges) 2. Input field (such as feedback forum, contact page) 3. Buy or sell products 4. Database to store data focus on: (i) Authentication: Verify the strength of authentication mechanism. Test for weak or easily guessable passwords. (ii) Check for proper input validation to prevent injection attacks such as SQL injection, cross-site scripting (XSS), and command injection. Ensure that user inputs are sanitized and validated before processing. Skills and Experience Required: - Proven track record in eCommerce website development - Expertise in implementing user authentication systems - Familiarity with digital product (specifically eBook) sales and download...

    €104 (Avg Bid)
    €104 Povprečna ponudba
    171 ponudb

    I'm in need of a security expert to properly configure Fail2ban on my Ubuntu server that is dedicated to filter and protect my OpenVPN setup. Your task will be to ensure that Fail2ban effectively mitigates the threat of: - Brute force attacks - DDoS attacks - Unauthorized login attempts Ideal Skills Include: - Strong knowledge of Ubuntu - Experience setting up and configuring Fail2ban - Understanding of NGINX Note: I am running a NGINX service with free openvpn for a local and private tunnel between The Server and many clients from a script.

    €31 (Avg Bid)
    €31 Povprečna ponudba
    10 ponudb

    I'm seeking a professional to conduct a smooth transition of my CDN services from StackPath to Cloudflare. The reason for this migration is not focusing on better performance, cost savings, or additional features, but, potentially, for multiple reasons or for reasons not listed here. This project doesn't have any specific requirements in regards to DDoS protection, global content delivery, or HTTPS support, however, having general experience with CDN migrations and infrastructures will be beneficial. Requirements: - Background in managing CDN services - Knowledge of StackPath and Cloudflare platforms - Mitigation plans for potential downtime during the migration Please include any relevant past work, experiences and detailed project proposals to boost your application...

    €31 (Avg Bid)
    €31 Povprečna ponudba
    22 ponudb

    I am in need of a skilled cybersecurity professional with specific experience in DDoS threats. The purpose of this project is to capture and analyze DDoS attack traffic from our corporate network. With your help, I aim to: - Identify patterns that indicate a potential DDoS threat - Understand our network's vulnerabilities to these specific attacks - Develop a proactive defense system through learned network behavior Please note, this project requires experience with corporate network environments, analysis of DDoS network traffic, and a deep understanding of network defense systems.

    €211 (Avg Bid)
    €211 Povprečna ponudba
    11 ponudb

    ...solution. Here's a snapshot of what I'm looking for: - We'd like the icon to the left of the example attached to be the outline of the State of Michigan - A unique and professional logo encapsulating the strength and security offered by our business insurance program. - The logo should signify our core values and mission, which is to protect businesses from the ever-looming threat of cyber-attacks. Ideal skills and experience for the job would include: - Proven experience in graphic design or similar field. - A strong portfolio demonstrating logo design skills. - Understanding of brand continuity and visual communication. - Knowledge of color psychology and its implementation. If you have a knack for transforming visions into compelling visuals, I'd love ...

    €94 (Avg Bid)
    Zagotovljen
    €94
    313 vnosov

    ...This is a small project with approx 4 servers to be monitored 1. Server Requirements: We use both Microsoft and Linux servers, the toolsets deployed should be able to factor in both. 2. Performance Metrics: For Microsoft servers, the essential aspects to be monitored include: - CPU usage: Both average and peak usage. - Memory availability - Storage capacity - Network Traffic - Attacks per hour statistics 3. Reporting. If possible I would like to have a monthly report sent to an email address showing the average and peak of each metric for each server 4. Skills and Experience: The ideal freelancer should have enough proven experience with Prometheus & Graphana. Working knowledge of both Microsoft and Linux servers is crucial. By understanding the variatio...

    €155 (Avg Bid)
    €155 Povprečna ponudba
    28 ponudb

    I need a knowledgeable freelancer to create dynamic and engaging info-graphics that bring information security awareness to life. These should focus on, but not restrict to: - Cyber attacks and threat mitigation - Privacy laws and data protection - Safe online habits and phishing The target audience will stretch from employees and students to the general public. All designs must be delivered in PDF format. Ideal candidates should have prior experience in graphic design, a keen attention to detail, and a solid understanding of cybersecurity concepts. Previous experience in creating info-graphics for a similar audience will be appreciated. Your ability to translate complex info into easily digestible and visual formats will be crucial for this role.

    €77 (Avg Bid)
    €77 Povprečna ponudba
    137 ponudb

    Developing an application on the Ryu controller in an SDN network. Initially, I aim to process data. Next, establish a Al agent for detecting and mitigating DDoS attacks. Finally, generate graphical curves to illustrate the results.

    €173 (Avg Bid)
    €173 Povprečna ponudba
    14 ponudb

    ...proficient in Zeek/Bro Intrusion Detection Systems (IDS) specifically on the Linux platform. Key Tasks: - Conducting comprehensive Traffic Analysis - Effective Log Management - Developing customized scripts - Reviewing and Implementing rules effectively The primary goal of this project is to: - Enhance our network's security - Develop strategies for the detection and prevention of cyber attacks - Improve our incident response capabilities Ideal Skills: - Profound knowledge and experience with Zeek/Bro IDS and Linux are paramount. - Solid track record in traffic analysis and log management - Experience with script development - Proven ability to review and implement rules effectively. - Familiarity with Cybersecurity policies and Incident management strategies ...

    €152 (Avg Bid)
    €152 Povprečna ponudba
    22 ponudb

    I need a skilled IT professional to handle my network hub and server management issues. Your responsibilities would include: - Server management: Delve into the...management of the network hub, ensuring seamless interconnectivity and performance. - Troubleshooting & maintenance: Prompt identification and resolution of issues related to the server and network hub, ensuring optimal uptime and reliability. - Security enhancement: Develop and implement strategies to fortify the security of my servers and network hubs preventing unauthorised access or potential attacks. Key skills include extensive experience in Windows server management, network hub management, advanced troubleshooting, and security enhancement capabilities. Proven experience dealing with similar projects is hig...

    €36 / hr (Avg Bid)
    €36 / hr Povprečna ponudba
    30 ponudb

    I need a skilled developer to design control/IK rig functions in Unreal Engine 5 for effective in-game interactions. Core functionalities to be developed should allow for repositioning bones and creating constraints for grappling attacks. The following skills and experience are ideal for the job: - Comprehensive knowledge of Unreal Engine 5 - Proficiency in coding and developing control/IK rigs - Experience in creating constraints and repositioning functions Your responsibilities will include: - Designing and implementing the control/IK rig - Ensuring seamless in-game interactions - Quality assurance and testing for any bugs or issues. Your goal is to develop an optimal control/IK rig that will enable more engaging in-game grappling interactions. If this sounds like a match to...

    €508 (Avg Bid)
    €508 Povprečna ponudba
    28 ponudb

    ...inherent in quantum systems. This article delves into the application of error correction techniques to bolster the security and reliability of QKD protocols. Through a technical exploration of error correction methodologies such as syndrome decoding and cascade concatenation, this paper elucidates their role in mitigating errors and enhancing the robustness of QKD systems against eavesdropping attacks. Introduction: Quantum Key Distribution (QKD) has emerged as a revolutionary cryptographic paradigm, exploiting the fundamental properties of quantum mechanics to enable secure communication channels. Despite its potential, QKD protocols are susceptible to errors stemming from quantum noise and other environmental factors. This article presents a comprehensive analysis of error co...

    €245 (Avg Bid)
    €245 Povprečna ponudba
    6 ponudb

    ...using: Static analysis – Inspecting an application’s code to estimate the way it behaves while running. These tools can scan the entirety of the code in a single pass. Dynamic analysis – Inspecting an application’s code in a running state. This is a more practical way of scanning, as it provides a real-time view into an application’s performance. 2. Gaining Access This stage uses web application attacks, such as cross-site scripting, SQL injection and backdoors, to uncover the vulnerabilities. You can then try and exploit these vulnerabilities, typically by escalating privileges, stealing data, intercepting traffic, etc., to understand the damage they can cause. 3. Maintaining access The goal of this stage is to see if the vulnerability can be us...

    €350 (Avg Bid)
    €350 Povprečna ponudba
    30 ponudb

    ...for: - Investigating potential security vulnerabilities within our server - Proposing and implementing necessary measures to fortify server security While the requirement does not particularly target any specific area of security, a comprehensive understanding of all aspects of server security, from firewalls to data encryption, will be regarded as an asset. Experience with warding off hacking attacks is particularly desired. Candidates who are skilled in configuring email accounts or setting up domains and databases, while not a mandatory requirement for this project, will be preferred. Of greater importance is the ability to diagnose WordPress websites hosted the Hestia control panel experience in Hestial control panel is very important and key in this task The working relatio...

    €32 (Avg Bid)
    €32 Povprečna ponudba
    20 ponudb

    Per country analysis of Distributed Denial of Service attacks We have been collecting data on UDP reflection based Distributed Denial of Service attacks since 2014. There are significant differences in attack patterns between countries (time of day, day of week, target of attack) and in response to global interventions targeting DDoS. This project would involve drilling down in to the per-country data to understand what is going on and why.

    €129 (Avg Bid)
    €129 Povprečna ponudba
    28 ponudb

    Top ddos attacks člankov Skupnosti