{"response":{"docs":[{"system_create_dtsi":"2020-05-15T23:09:49Z","system_modified_dtsi":"2020-05-15T23:14:46Z","has_model_ssim":["Article"],"id":"m326m3092","accessControl_ssim":["49fa97c5-46f8-4606-a4c9-9b710c33221e"],"hasRelatedMediaFragment_ssim":["p2676w829"],"hasRelatedImage_ssim":["p2676w829"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Securing A Small Office Home Office Network: Integrating A Supervised Neural Network Algorithm"],"date_uploaded_dtsi":"2020-05-15T23:09:49Z","date_modified_dtsi":"2020-05-15T23:09:49Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/r3qd-fz22"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Azumah, Sylvia Worlali","Li, Chengcheng"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Small office home office networks have become a target for many threat actors, hackers and cyber attackers and hence there is an urgent need to secure the network from such attackers. Most small office home office network users do not see the need to provide enough security to their networks because they assume no one is going to hack them forgetting that the biggest threat of our small home networks today comes from the outside. The challenge of misconfiguration of routers, firewalls and default configurations in our small home networks renders the network vulnerable to attacks such as DDos , phishing attacks , virus and other network attacks hence the need to implement a  detection algorithm to help identify flaws in the pattern of the small office network. It turns out that about 75% of existing approaches focused on intrusion detection in 802.11 wireless networks of a SOHO and not the entire network. These approaches do not efficiently secure the network entirely leaving the rest prone to attacks can occur with or without the internet. This paper proposes to add another layer of security to the other preventive measures in a  SOHO network by designing, implementing and testing a supervised neural network algorithm to identify attacks on the small home network and also to send a notification to users to keep them informed of the activities on their network. The supervised neural network algorithm will have a dataset representing both attacks and non-attacks which will be used in the training phase. The system should be able to detect and identify the various attacks and anomalies when they occur on the network and help keep the users informed.  \r\n"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/17"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/p2676w829?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["p2676w829"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["p2676w829"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SECURING A SMALL OFFICE HOME OFFICE NETWORK INTEGRATING A SUPERVISED NEURAL NETWORK ALGORITHM","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/m326m3092"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086680363696128,"timestamp":"2021-04-15T06:26:19.778Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:56:38Z","system_modified_dtsi":"2020-05-15T23:16:12Z","has_model_ssim":["Article"],"id":"1z40kv09z","accessControl_ssim":["46d78754-13db-4305-a31a-27bc1d17960d"],"hasRelatedMediaFragment_ssim":["dr26xz84f"],"hasRelatedImage_ssim":["dr26xz84f"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Application of Autoencoder Duets in Anomaly and Intrusion Detection"],"date_uploaded_dtsi":"2020-05-15T22:56:38Z","date_modified_dtsi":"2020-05-15T22:56:38Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/vm3m-xy59"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Li, Chengcheng","Lee, Kijung","Mathur, Nitin","Gonen, Bilal"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Signature-based intrusion detection methods report high accuracy with a low false alarm rate. However, they do not perform well when faced with new or emerging threats. This work focuses on anomaly-based data driven methods to identify potential zero-day-attacks using a specific class of neural networks known as the autoencoder."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/10"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/dr26xz84f?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["dr26xz84f"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["dr26xz84f"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"APPLICATION OF AUTOENCODER DUETS IN ANOMALY AND INTRUSION DETECTION","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/1z40kv09z"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086688839335936,"timestamp":"2021-04-15T06:26:27.861Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T21:48:56Z","system_modified_dtsi":"2020-05-15T21:49:04Z","has_model_ssim":["Article"],"id":"b8515p72s","accessControl_ssim":["b9c36ab6-10bd-489f-b54a-b49cf6c54c98"],"hasRelatedMediaFragment_ssim":["mc87pr72d"],"hasRelatedImage_ssim":["mc87pr72d"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["A LOOK AT EDGELESS HYBRID-CLOUD INFRASTRUCTURE – AN OPTIMIZED SOLUTION FOR MULTI-SITE BACKUP, DISASTER RECOVERY AND HIGH AVAILABILITY"],"date_uploaded_dtsi":"2020-05-15T21:48:56Z","date_modified_dtsi":"2020-05-15T21:48:56Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/t5jz-9m40"],"journal_title_tesim":["IT Research Symposium’19"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Li, Chengcheng","Efosa, Ogbomo"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Cloud computing has been one of the major disruptive technology of this century changing the entire face of IT infrastructure across all spectrum. This has led to tremendous development, improvement and cost efficient means of securing IT infrastructures. Virtualization is the backbone driving the numerous cloud solutions and also making them marketable in the pay-as-you-use mechanism for all kind of deployment. This research is focus on improving the security and performance of cloud storage, backup and disaster recovery by evaluating the possibility of eliminating the Recovery Point Objective (RPO) and Recovery Time Objective (RTO). A live synchronization between production and Disaster Recovery (DR) sites is presented. We considered the mechanism behind Virtual Machines (VM) and hypervisor interaction with physical memory on host computers and evaluated the ability of VM to read/write directly to a unified multiple storage locations. Dependencies, requirements and guidelines for implementing this solution would also be analyzed."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2019-04-11"],"source_tesim":["IT Research Symposium’19"],"thumbnail_path_ss":"/downloads/mc87pr72d?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["mc87pr72d"],"member_of_collections_ssim":["2019 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["jq085m248"],"file_set_ids_ssim":["mc87pr72d"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"LOOK AT EDGELESS HYBRIDCLOUD INFRASTRUCTURE AN OPTIMIZED SOLUTION FOR MULTISITE BACKUP DISASTER RECOVERY AND HIGH AVAILABILITY","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["jq085m248"],"nesting_collection__parent_ids_ssim":["jq085m248"],"nesting_collection__pathnames_ssim":["jq085m248/b8515p72s"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697097422277181440,"timestamp":"2021-04-15T09:17:04.064Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Article","hits":3,"label":"Article"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Li, Chengcheng","hits":3,"label":"Li, Chengcheng"},{"value":"Azumah, Sylvia Worlali","hits":1,"label":"Azumah, Sylvia Worlali"},{"value":"Efosa, Ogbomo","hits":1,"label":"Efosa, Ogbomo"},{"value":"Gonen, Bilal","hits":1,"label":"Gonen, Bilal"},{"value":"Lee, Kijung","hits":1,"label":"Lee, Kijung"},{"value":"Mathur, Nitin","hits":1,"label":"Mathur, Nitin"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Information Technology","hits":3,"label":"Information Technology"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":3,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"- School of Information Technology","hits":3,"label":"- School of Information Technology"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":3,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":3,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2020-04-14","hits":2,"label":"2020-04-14"},{"value":"2019-04-11","hits":1,"label":"2019-04-11"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"ws859g993","hits":2,"label":"ws859g993"},{"value":"jq085m248","hits":1,"label":"jq085m248"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":3,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":3,"first_page?":true,"last_page?":true}}}