Implementing a NIDS System for protecting computer and wireless networks using various machine learning approaches
Average rating
Cast your vote
You can rate an item by clicking the amount of stars they wish to award to this item.
When enough users have cast their vote on this item, the average rating will also be shown.
Star rating
Your vote was cast
Thank you for your feedback
Thank you for your feedback
Author
Eppich, JosephKeyword
Network Intrusion Detection System (NIDS)Computer security
Network security
Wireless network
Denial of service attack
Network vulnerability
Machine learning
Artificial intelligence
Readers/Advisors
Kholidy, HishamTerm and Year
Spring 2024Date Published
2024-05
Metadata
Show full item recordAbstract
In modern Wireless Networks, security is critical. With the ever-evolving attacks on wireless networks, both public and private, the use of Network Intrusion Detection Systems is at an all-time high. While NIDS is needed more than ever, its current security structure is starting to show signs of becoming obsolete. With the alarming rate of attacks in the modern digital space, NIDS needs to have a way to react effectively. Setting up NIDS is too slow and can cause many issues when defending against these attacks, leaving wireless networks vulnerable. Three approaches are often discussed NIDS: signature-based, anomaly-based, as well as hybrid. Implementing Machine Learning would fall under an updated version of Anomaly Learning. The hope from these actions is that they will allow new attacks to be caught without user interference. This paper will discuss various forms of Machine Learning, NIDS, and the implementation of both into each other. This paper will discuss our current options in Machine Learning NIDS and explain how they’ve evolved thus far and the advantages at each stage. This paper, while mainly focusing on the machine learning implementation of NIDS, will touch briefly on how this implementation could strengthen current security in wireless networks.Citation
Eppich, J. (2024, May). Implementing a NIDS System for protecting computer and wireless networks using various machine learning approaches: A master’s project in partial fulfillment of the requirements for the degree of Masters in Network And Computer Security. SUNY Polytechnic Institute.Related items
Showing items related by title, author, creator and subject.
-
The Deep Space Network - A Technology Case Study and What Improvements to the Deep Space Network are Needed to Support Crewed Missions to Mars?Falke, Prasad; Hash, Larry; Advisor; Marsh, John; Reviewer; White, Joshua; Reviewer; Climek, David; Reviewer; Kwiat, Kevin; Reviewer (2017-05-28)The purpose of this thesis research is to find out what experts and interested people think about Deep Space Network (DSN) technology for the crewed Mars mission in the future. The research document also addresses possible limitations which need to be fix before any critical missions. The paper discusses issues such as: data rate, hardware upgrade and new install requirement and a budget required for that, propagation delay, need of dedicated antenna support for the mission and security constraints. The Technology Case Study (TCS) and focused discussion help to know the possible solutions and what everyone things about the DSN technology. The public platforms like Quora, Reddit, StackExchange, and Facebook Mars Society group assisted in gathering technical answers from the experts and individuals interested in this research.
-
Presentation of Self in MySpace.com an Online Social Networking SitePerretta, Heather (2007-05-01)This ethnographic study explores the presentation of self on MySpace.com, an online social networking website. One hundred MySpace.com profile pages were analyzed to discover how users complete and manipulate the MySpace template to create a virtual presentation of self. The one hundred profile pages represented fifty stated female users and fifty stated male users. Each page was archived and coded based on the elements present that were viewable by the public. All users were selected at random using the website search tool and a random number generator. The work of Erving Goffman in his 1959 book, The Presentation of Self in Everyday Life, is the theoretical foundation for the this study. Analysis of the profile pages sampled indicates that most users studied modify the default template and add various elements from textual information to pictures, music, and video clips to the profile pages and create a virtual presentation of self on MySpace.com.
-
Risk Sensitive Optimal Synchronization of Coupled Stochastic Neural Networks with Chaotic PhenomenaLiu, Ziqian (IEEE, 2015-05-26)This paper presents a new theoretical design of how an optimal synchronization is achieved for stochastic coupled neural networks with respect to a risk sensitive optimality criterion. The approach is rigorously developed by using the Hamilton-Jacobi-Bellman equation, Lyapunov technique, and inverse optimality, to obtain a risk sensitive state feedback controller, which guarantees that the chaotic drive network synchronizes with the chaotic response network influenced by uncertain noise signals, with an eye on a given risk sensitivity parameter. Finally, a numerical example is given to demonstrate the effectiveness of the proposed approach.