Author

Pooja Wagh

Abstract

Flow analysis has always been a great concern for a network system. An attacker can gain important information through several ways by monitoring the frequency and timing of network packets or by impersonating another user through remote access. Access to a network system based on single-factor authentication is nothing but monitoring the perimeter around the network leaving a company's a network wide open for the inside threat. There is a necessity to develop a classic network to reduce or eliminate threats within the organization. This thesis will analyze the flows to inspect every activity performed within the network in order for the untrusted flows to earn their way in becoming trusted flows based on notion of flow activity matching a specified pattern affiliated with the role.

Library of Congress Subject Headings

Computer networks--Security measures; Computer networks--Access control; Packet switching (Data transmission)--Security measures

Publication Date

2012

Document Type

Thesis

Student Type

Graduate

Degree Name

Networking and System Administration (MS)

Department, Program, or Center

Computer Science (GCCIS)

Advisor

Border, Charles

Advisor/Committee Member

Lutz, Peter

Advisor/Committee Member

Troell, Luther

Comments

Note: imported from RIT’s Digital Media Library running on DSpace to RIT Scholar Works in December 2013.

Campus

RIT – Main Campus

Plan Codes

COMPSEC-MS

Share

COinS