Ashish ( Arjun ) - Ashish ( Sandra ) -Computer network Dissertation PPT

pptx

School

Yes College *

*We aren’t endorsed by this school

Course

506

Subject

Information Systems

Date

Nov 24, 2024

Type

pptx

Pages

10

Uploaded by sipet

Report
COMPUTER NETWORK : DISSERTATI ON IPR REPORT
INTRODUCTION Wireless networks are being the integral section of how the individual conducts the business. They simplify various operations as well as support them resolving the clutter affected through 100 of cables but keeping the cable less networks secure too poses few issues.
OVERVIEW Through the broad spread utilization of the internet the people are capable for establishing the business operations digitally as well as without becoming tie down through the wires and cables. The wireless networks are among the relatively advanced techniques carried out for the lives through digital technologies.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
RESEARCH QUESTION What kind of attacks on the wireless networks should be analyzed for their detection? What are the reasons behind the vulnerability of wireless networks? What are the merits and demerits of diverse intrusion detection technologies?
TECHNICAL WORK The Mac address implemented as the media access control address which is considered as a unique identifier used for the network interface controller (Picoto et al. 2014). It is demonstrated that, unlike the Mac addresses as well as the other packet contents, the hackers will have the less control on the signal print they create. (Source: Faria and Cheriton, 2022) .
TOOLS AND TECHNIQUES The intrusion detecting techniques importantly utilize the two important detection systems -: anomaly intrusion detection system as well as signature intrusion detection system (Moustafa et al. 2018). Intrusion may be described as such type of the unauthorized activities or attacks which affect the loss to the wireless networking system (Lu and Zhu, 2019).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
DELIVERABLES Identity Positive as well as accurate identification of the resources, host, services, network users and applications are must. Privacy of data The data privacy is facilitating the confidential information on the command for authorizing the clients through safeguarding the data by the eaves dropping. Security perimeter It allows the professionals to monitor the access of the network software, services and data so just authorized clients as well as data may transfer from the network.
PROGRESS TO DATE Till date, the Mac address has been implemented successfully for accessing the control over the media address that is relevant with identifying for utilizing the network interface controller. The identification of the positive as well as accurate resources, network, users, hosting, applications are developed for designing the policy management, privacy of data, monitoring the security and security parameters (Vero et al. 2019).
PLANNED WORK
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
BIBLIOGRAPHY Picoto, W.N., Bélanger, F. and Palma-dos-Reis, A., 2014. An organizational perspective on m-business: usage factors and value determination. European Journal of Information Systems , 23 (5), pp.571- 592. Moustafa, N., Turnbull, B. and Choo, K.K.R., 2018. An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet of Things Journal , 6 (3), pp.4815-4830. De Vero, L., Boniotti, M.B., Budroni, M., Buzzini, P., Cassanelli, S., Comunian, R., Gullo, M., Logrieco, A.F., Mannazzu, I., Musumeci, R. and Perugini, I., 2019. Preservation, characterization and exploitation of microbial biodiversity: The perspective of the italian network of culture collections. Microorganisms , 7 (12), p.685. Lu, Y. and Zhu, M., 2019. A control-theoretic perspective on cyber-physical privacy: Where data privacy meets dynamic systems. Annual Reviews in Control , 47 , pp.423-440. B. Faria, D. and R. Cheriton, D., 2022. Detecting Identity-Based Attacks in Wireless Networks Using Signal prints . [online] ResearchGate. Available at: https://www.researchgate.net/publication/221005694_Detecting_identity-ba sed_attacks_in_wireless_networks_using_signalprints [Accessed 13 May 2022].