Validating Network Security with Predictive Analytics: A Design Guide to Bridge Stochastic Modeling into a Computationally Intelligent Dashboard
dc.contributor.author | Galavotti, Christopher R. | |
dc.contributor.author | Kahn, Russell; Thesis Advisor | |
dc.contributor.author | Stam, Kathryn; Second Reader | |
dc.date.accessioned | 2020-02-10T18:06:38Z | |
dc.date.accessioned | 2020-06-22T14:34:33Z | |
dc.date.available | 2020-02-10T18:06:38Z | |
dc.date.available | 2020-06-22T14:34:33Z | |
dc.date.issued | 2019-05 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12648/929 | |
dc.description | A Research Thesis submitted to the College of Arts and Sciences at SUNY Polytechnic Institute, Utica, NY in partial fulfillment of the requirements for the degree of Master of Science in Information Design and Technology. | en_US |
dc.description.abstract | Network posture has historically relied on traditional and reactionary methods for protection. These methods most commonly consist of network segmentation, intrusion detection systems, intrusion prevention systems, and signature-based detections. However, these traditional security platforms have proven to be an inadequate deterrent to the complex threat matrix that we currently find ourselves in. It is only through computational intelligence that we can truly identify potential intrusion areas and network abnormalities. This study presents a path forward for industry professionals on how to implement this computational approach into their network security platforms, particularly through stochastic modeling and simulation. Acknowledging the complex nature of this approach, a human-centered design methodology is also outlined on how to integrate this science into the enterprise via a predictive analytical dashboard. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | network security | en_US |
dc.subject | stochastic modeling | en_US |
dc.subject | attack graphs | en_US |
dc.subject | predictive analytics | en_US |
dc.subject | exploitability benefits | en_US |
dc.subject | markovian chains | en_US |
dc.subject | computationally intelligent systems | en_US |
dc.subject | principles of design | en_US |
dc.subject | human-centered design theory | en_US |
dc.subject | model simulation and acceleration | en_US |
dc.subject | software development process | en_US |
dc.title | Validating Network Security with Predictive Analytics: A Design Guide to Bridge Stochastic Modeling into a Computationally Intelligent Dashboard | en_US |
dc.type | Thesis | en_US |
refterms.dateFOA | 2020-06-22T14:34:33Z | |
dc.description.institution | SUNY Polytechnic Institute |