Flow analysis has always been a great concern for a network system. An attacker can gain important information through several ways by monitoring the frequency and timing of network packets or by impersonating another user through remote access. Access to a network system based on single-factor authentication is nothing but monitoring the perimeter around the network leaving a company's a network wide open for the inside threat. There is a necessity to develop a classic network to reduce or eliminate threats within the organization. This thesis will analyze the flows to inspect every activity performed within the network in order for the untrusted flows to earn their way in becoming trusted flows based on notion of flow activity matching a specified pattern affiliated with the role.
Library of Congress Subject Headings
Computer networks--Security measures; Computer networks--Access control; Packet switching (Data transmission)--Security measures
Networking and System Administration (MS)
Department, Program, or Center
Computer Science (GCCIS)
Wagh, Pooja, "Flow analysis based on role and pattern matching" (2012). Thesis. Rochester Institute of Technology. Accessed from
RIT – Main Campus