Abstract
Flow analysis has always been a great concern for a network system. An attacker can gain important information through several ways by monitoring the frequency and timing of network packets or by impersonating another user through remote access. Access to a network system based on single-factor authentication is nothing but monitoring the perimeter around the network leaving a company's a network wide open for the inside threat. There is a necessity to develop a classic network to reduce or eliminate threats within the organization. This thesis will analyze the flows to inspect every activity performed within the network in order for the untrusted flows to earn their way in becoming trusted flows based on notion of flow activity matching a specified pattern affiliated with the role.
Library of Congress Subject Headings
Computer networks--Security measures; Computer networks--Access control; Packet switching (Data transmission)--Security measures
Publication Date
2012
Document Type
Thesis
Student Type
Graduate
Degree Name
Networking and System Administration (MS)
Department, Program, or Center
Computer Science (GCCIS)
Advisor
Border, Charles
Advisor/Committee Member
Lutz, Peter
Advisor/Committee Member
Troell, Luther
Recommended Citation
Wagh, Pooja, "Flow analysis based on role and pattern matching" (2012). Thesis. Rochester Institute of Technology. Accessed from
https://repository.rit.edu/theses/146
Campus
RIT – Main Campus
Plan Codes
COMPSEC-MS
Comments
Note: imported from RIT’s Digital Media Library running on DSpace to RIT Scholar Works in December 2013.