Ashish ( Arjun ) - Ashish ( Sandra ) -Computer network Dissertation PPT
pptx
keyboard_arrow_up
School
Yes College *
*We aren’t endorsed by this school
Course
506
Subject
Information Systems
Date
Nov 24, 2024
Type
pptx
Pages
10
Uploaded by sipet
COMPUTER
NETWORK :
DISSERTATI
ON
IPR REPORT
INTRODUCTION
Wireless networks are being the integral
section of how the individual conducts the
business.
They simplify various operations as well as
support them resolving the clutter affected
through 100 of cables but keeping the cable
less networks secure too poses few issues.
OVERVIEW
Through the broad spread utilization of
the internet the people are capable for
establishing the business operations
digitally as well as without becoming
tie down through the wires and cables.
The wireless networks are among the
relatively advanced techniques carried
out for the lives through digital
technologies.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
RESEARCH QUESTION
What kind of attacks on the wireless networks
should be analyzed for their detection?
What are the reasons behind the vulnerability
of wireless networks?
What are the merits and demerits of diverse
intrusion detection technologies?
TECHNICAL WORK
The Mac address implemented as the
media
access control address which is considered as
a
unique identifier used for the network
interface controller (Picoto et al. 2014).
It is demonstrated that, unlike the
Mac addresses as well as the other packet
contents, the hackers will have
the less control on the signal
print they create.
(Source: Faria and Cheriton, 2022)
.
TOOLS AND TECHNIQUES
The intrusion detecting techniques
importantly utilize the two important
detection systems -: anomaly intrusion
detection system as well as signature
intrusion detection system (Moustafa et
al. 2018).
Intrusion may be described as such type
of the unauthorized activities or attacks
which affect the loss to the wireless
networking system
(Lu and Zhu, 2019).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
DELIVERABLES
Identity
Positive as well as accurate identification of the
resources, host, services, network users and
applications are must.
Privacy of data
The data privacy is facilitating the confidential
information on the command for authorizing the
clients through safeguarding the data by the eaves
dropping.
Security perimeter
It allows the professionals to monitor the access of the
network software, services and data so just authorized
clients as well as data may transfer from the network.
PROGRESS TO DATE
Till date, the Mac address has been implemented
successfully for accessing the control over the
media address that is relevant with identifying
for utilizing the network interface controller.
The identification of the positive as well as
accurate resources, network, users, hosting,
applications are developed for designing the
policy management, privacy of data, monitoring
the security and security parameters (Vero et al.
2019).
PLANNED WORK
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
BIBLIOGRAPHY
Picoto, W.N., Bélanger, F. and Palma-dos-Reis, A., 2014. An organizational
perspective on m-business: usage factors and value
determination.
European Journal of Information Systems
,
23
(5), pp.571-
592.
Moustafa, N., Turnbull, B. and Choo, K.K.R., 2018. An ensemble intrusion
detection technique based on proposed statistical flow features for
protecting network traffic of internet of things.
IEEE Internet of Things
Journal
,
6
(3), pp.4815-4830.
De Vero, L., Boniotti, M.B., Budroni, M., Buzzini, P., Cassanelli, S., Comunian,
R., Gullo, M., Logrieco, A.F., Mannazzu, I., Musumeci, R. and Perugini, I.,
2019. Preservation, characterization and exploitation of microbial
biodiversity: The perspective of the italian network of culture
collections.
Microorganisms
,
7
(12), p.685.
Lu, Y. and Zhu, M., 2019. A control-theoretic perspective on cyber-physical
privacy: Where data privacy meets dynamic systems.
Annual Reviews in
Control
,
47
, pp.423-440.
B. Faria, D. and R. Cheriton, D., 2022.
Detecting Identity-Based Attacks in
Wireless Networks Using Signal prints
. [online] ResearchGate. Available at:
https://www.researchgate.net/publication/221005694_Detecting_identity-ba
sed_attacks_in_wireless_networks_using_signalprints
[Accessed 13 May 2022].