Now showing items 1-5 of 5

    • Analysis of Security Vulnerabilities in Web Applications using Threat Modeling 

      Kondamarri, Samuel Sudhakar (North Dakota State University, 2011)
      Software security issues have been a major concern to the cyberspace community; therefore, a great deal of research on security testing has been performed, and various security testing techniques have been developed. A ...
    • Feature Engineering on the Cybersecurity Dataset for Deployment on Software Defined Network 

      Rifat, Nafiz Imtiaz (North Dakota State University, 2020)
      These days, due to dependency on the fast-moving world's modern technology, the increasing use of smart devices and the internet affect network traffic. Many intrusion detection studies concentrate on feature selection or ...
    • Simple Identity Manager 

      Kolluru, Sunil (North Dakota State University, 2014)
      Identity management is a key area for any enterprise. Maintaining user profiles, including e-mail, passwords, and other personal information, and providing a way to manage them is ubiquitous for any company. Specifically, ...
    • Threat Identification from Access Logs Using Elastic Stack 

      Vethanayagam, Suhanthan (North Dakota State University, 2020)
      Access log management is an essential part of cybersecurity. Lack of insight into user authentication patterns can hinder readiness and reaction to the growing threat of cyberattacks. Central Authentication Service (CAS) ...
    • Using Message Queuing to Drive Polyglot Identity and Access Management Development 

      Frovarp, Richard Ernest Orvin (North Dakota State University, 2017)
      This paper describes a method of using an Advanced Message Queuing Protocol (AMQP) broker, RabbitMQ in particular, to facilitate the management of accounts across a variety of systems. Higher education poses a unique ...