Flow analysis based on role and pattern matching

Show full item record

Title: Flow analysis based on role and pattern matching
Author: Wagh, Pooja
Abstract: Flow analysis has always been a great concern for a network system. An attacker can gain important information through several ways by monitoring the frequency and timing of network packets or by impersonating another user through remote access. Access to a network system based on single-factor authentication is nothing but monitoring the perimeter around the network leaving a company's a network wide open for the inside threat. There is a necessity to develop a classic network to reduce or eliminate threats within the organization. This thesis will analyze the flows to inspect every activity performed within the network in order for the untrusted flows to earn their way in becoming trusted flows based on notion of flow activity matching a specified pattern affiliated with the role.
Record URI: http://hdl.handle.net/1850/15280
Date: 2012

Files in this item

Files Size Format View
PWaghThesis2012.pdf 1.360Mb PDF View/Open

The following license files are associated with this item:

This item appears in the following Collection(s)

Show full item record

Search RIT DML


Advanced Search

Browse