Implementing a NIDS System for protecting computer and wireless networks using various machine learning approaches
Average rating
Cast your vote
You can rate an item by clicking the amount of stars they wish to award to this item.
When enough users have cast their vote on this item, the average rating will also be shown.
Star rating
Your vote was cast
Thank you for your feedback
Thank you for your feedback
Author
Eppich, JosephKeyword
Network Intrusion Detection System (NIDS)Computer security
Network security
Wireless network
Denial of service attack
Network vulnerability
Machine learning
Artificial intelligence
Readers/Advisors
Kholidy, HishamTerm and Year
Spring 2024Date Published
2024-05
Metadata
Show full item recordAbstract
In modern Wireless Networks, security is critical. With the ever-evolving attacks on wireless networks, both public and private, the use of Network Intrusion Detection Systems is at an all-time high. While NIDS is needed more than ever, its current security structure is starting to show signs of becoming obsolete. With the alarming rate of attacks in the modern digital space, NIDS needs to have a way to react effectively. Setting up NIDS is too slow and can cause many issues when defending against these attacks, leaving wireless networks vulnerable. Three approaches are often discussed NIDS: signature-based, anomaly-based, as well as hybrid. Implementing Machine Learning would fall under an updated version of Anomaly Learning. The hope from these actions is that they will allow new attacks to be caught without user interference. This paper will discuss various forms of Machine Learning, NIDS, and the implementation of both into each other. This paper will discuss our current options in Machine Learning NIDS and explain how they’ve evolved thus far and the advantages at each stage. This paper, while mainly focusing on the machine learning implementation of NIDS, will touch briefly on how this implementation could strengthen current security in wireless networks.Citation
Eppich, J. (2024, May). Implementing a NIDS System for protecting computer and wireless networks using various machine learning approaches: A master’s project in partial fulfillment of the requirements for the degree of Masters in Network And Computer Security. SUNY Polytechnic Institute.Related items
Showing items related by title, author, creator and subject.
-
The Deep Space Network - A Technology Case Study and What Improvements to the Deep Space Network are Needed to Support Crewed Missions to Mars?Falke, Prasad; Hash, Larry; Advisor; Marsh, John; Reviewer; White, Joshua; Reviewer; Climek, David; Reviewer; Kwiat, Kevin; Reviewer (2017-05-28)The purpose of this thesis research is to find out what experts and interested people think about Deep Space Network (DSN) technology for the crewed Mars mission in the future. The research document also addresses possible limitations which need to be fix before any critical missions. The paper discusses issues such as: data rate, hardware upgrade and new install requirement and a budget required for that, propagation delay, need of dedicated antenna support for the mission and security constraints. The Technology Case Study (TCS) and focused discussion help to know the possible solutions and what everyone things about the DSN technology. The public platforms like Quora, Reddit, StackExchange, and Facebook Mars Society group assisted in gathering technical answers from the experts and individuals interested in this research.
-
Analysis of Queueing Networks in Equilibrium: Numerical Steady-State Solutions of Markov ChainsLokshina, Izabella V.; Lanting, Cees J. M. (IGI Global, 2020)Equilibria of queueing networks are a means for performance analysis of real communication networks introduced as Markov chains. In this paper, the authors developed, evaluated, and compared computational procedures to obtain numerical solutions for queueing networks in equilibrium with the use of direct, iterative, and aggregative techniques in steady-state analysis of Markov chains. Advanced computational procedures are developed with the use of Gaussian elimination, power iteration, Courtois’ decomposition, and Takahashi’s iteration techniques. Numerical examples are provided together with comparative analysis of obtained results. The authors consider these procedures are also applicable to other domains where systems are described with comparable queuing models and stochastic techniques are sufficiently relevant. Several suitable domains of applicability are proposed.
-
Increasing HIV Testing and Viral Suppression via Stigma Reduction in a Social Networking Mobile Health Intervention Among Black and Latinx Young Men and Transgender Women Who Have Sex With Men (HealthMpowerment): Protocol for a Randomized Controlled Trial.Muessig, Kathryn Elizabeth; Golinkoff, Jesse M; Hightow-Weidman, Lisa B; Rochelle, Aimee E; Mulawa, Marta I; Hirshfield, Sabina; Rosengren, A Lina; Aryal, Subhash; Buckner, Nickie; Wilson, M Skye; et al. (2020-12-16)Background: Stigma and discrimination related to sexuality, race, ethnicity, and HIV status negatively impact HIV testing, engagement in care, and consistent viral suppression (VS) among young Black and Latinx men who have sex with men and transgender women who have sex with men (YBLMT). Few interventions address the effects of intersectional stigma among youth living with HIV and those at risk for HIV within the same virtual space. Objective: Building on the success of the HealthMpowerment (HMP) mobile health (mHealth) intervention (HMP 1.0) and with the input of a youth advisory board, HMP 2.0 is an app-based intervention that promotes user-generated content and social support to reduce intersectional stigma and improve HIV-related outcomes among YBLMT. The primary objective of this study is to test whether participants randomized to HMP 2.0 report improvement in HIV prevention and care continuum outcomes compared with an information-only control arm. We will also explore whether participant engagement, as measured by paradata (data collected as users interact with an mHealth intervention, eg, time spent using the intervention), mediates stigma- and HIV care-related outcomes. Finally, we will assess whether changes in intersectional stigma and improvements in HIV care continuum outcomes vary across different types of social networks formed within the intervention study arms. Methods: We will enroll 1050 YBLMT aged 15 to 29 years affected by HIV across the United States. Using an HIV-status stratified, randomized trial design, participants will be randomly assigned to 1 of the 3 app-based conditions (information-only app-based control arm, a researcher-created network arm of HMP 2.0, or a peer-referred network arm of HMP 2.0). Behavioral assessments will occur at baseline, 3, 6, 9, and 12 months. For participants living with HIV, self-collected biomarkers (viral load) are scheduled for baseline, 6, and 12 months. For HIV-negative participants, up to 3 HIV self-testing kits will be available during the study period. Results: Research activities began in September 2018 and are ongoing. The University of Pennsylvania is the central institutional review board for this study (protocol #829805) with institutional reliance agreements with the University of North Carolina at Chapel Hill, Duke University, and SUNY Downstate Health Sciences University. Study recruitment began on July 20, 2020. A total of 205 participants have been enrolled as of November 20, 2020. Conclusions: Among a large sample of US-based YBLMT, this study will assess whether HMP 2.0, an app-based intervention designed to ameliorate stigma and its negative sequelae, can increase routine HIV testing among HIV-negative participants and consistent VS among participants living with HIV. If efficacious and brought to scale, this intervention has the potential to significantly impact the disproportionate burden of HIV among YBLMT in the United States. Trial registration: ClinicalTrials.gov NCT03678181; https://clinicaltrials.gov/ct2/show/study/NCT03678181. International registered report identifier (irrid): DERR1-10.2196/24043.