Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

CCE Theses and Dissertations

2018

Intrusion detection

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

A Novel Cooperative Intrusion Detection System For Mobile Ad Hoc Networks, Adam Solomon Jan 2018

A Novel Cooperative Intrusion Detection System For Mobile Ad Hoc Networks, Adam Solomon

CCE Theses and Dissertations

Mobile ad hoc networks (MANETs) have experienced rapid growth in their use for various military, medical, and commercial scenarios. This is due to their dynamic nature that enables the deployment of such networks, in any target environment, without the need for a pre-existing infrastructure. On the other hand, the unique characteristics of MANETs, such as the lack of central networking points, limited wireless range, and constrained resources, have made the quest for securing such networks a challenging task. A large number of studies have focused on intrusion detection systems (IDSs) as a solid line of defense against various attacks targeting …


Development And Validation Of A Proof-Of-Concept Prototype For Analytics-Based Malicious Cybersecurity Insider Threat In A Real-Time Identification System, Angel L. Hueca Jan 2018

Development And Validation Of A Proof-Of-Concept Prototype For Analytics-Based Malicious Cybersecurity Insider Threat In A Real-Time Identification System, Angel L. Hueca

CCE Theses and Dissertations

Insider threat has continued to be one of the most difficult cybersecurity threat vectors detectable by contemporary technologies. Most organizations apply standard technology-based practices to detect unusual network activity. While there have been significant advances in intrusion detection systems (IDS) as well as security incident and event management solutions (SIEM), these technologies fail to take into consideration the human aspects of personality and emotion in computer use and network activity, since insider threats are human-initiated. External influencers impact how an end-user interacts with both colleagues and organizational resources. Taking into consideration external influencers, such as personality, changes in organizational polices …