Date of Defense



Computer Science

First Advisor

Dr. Donna Kaminski

Second Advisor

Troy Quakenbush

Third Advisor

Chad Spitters


Security is obviously crucial in today's networking environments. As the Internet and company intranets grow, the need to secure data also grows. Network intruders, better known as "hackers", sneak into business and government networks attempting to manipulate, gather, or destroy data. These attackers have numerous tools and strategies available to them for infiltrating networks. Often the attacker can "sneak in" and then leave without being detected. Other times they may be detected, but it is often too late.

Access Setting

Honors Thesis-Campus Only