Midway NET‐150 Final Project Phase One: - asheesh8/NET-150-TECH-JOURNAL GitHub Wiki
Ashish Subedi NET-150 FINAL PROJECT MILESTONE ONE
TOPIC PREFERENCES: Virtual Private Network, Intrusion Detection System
(First Choice): VPN (Virtual Private Networks) A VPN is technology that creates a secure and encrypted connection that secures connections between a user’s device and networks over the internet. VPNs protect data from being almost intercepted by another public network. Because everything has to be sent over the internet, it is encrypted first so it does not get intercepted by attackers, hackers, or even internet providers. VPNs are widely used by businesses, and even on the individual scale (like I do sometimes) to protect privacy, even using it for secure remote access to other networks, and safely being able to transmit confidential data.
The place it has in Networking and Security?
It provides encryption through public networks, allows secure remote access to internal and external company networks, and helps user privacy to prevent data interception. What I've noticed is it's also often used in corporate security architecture, and it also protects users when connected to for example: Mcdonalds Public WiFi. Works by masking IP addresses, preventing location tracking and surveillance Used to bypass geographic content restrictions + even governmental restrictions (EX: swapping VPN to London to watch Peaky Blinders on Netflix) Level 3 of OSI model : Network Layer
Why I Want to Study This Topic:
I want to study VPNs because I have used them plenty before, and are also widely used in modern networking and cybersecurity. They come up so much. As a student that is interested in networking +technology, understanding how secure connections are created and how data encryption works is very important. VPNs are used by businesses, the government, and down to an individual level to protect information, and learning how they function will help me better understand how secure networks are designed.
https://www.techtarget.com/searchnetworking/definition/virtual-private-network https://www.geeksforgeeks.org/computer-networks/what-is-vpn-how-it-works-types-of-vpn/
(Second Choice): Intrusion Detection Systems (IDS)
A Intrusion Detection System is a form of security technology that is designed to monitor network traffic and system activity for any sus behavior or potential threats security wise. IDS tools analyze patterns of activity, and packets to detect cyberattacks like attempts to log in unauthorized, malware, or unusual network activity. When threats are detected, the system gives out alerts to admins so they can respond before anything is done. IDS systems play an important role in identifying threats before they can cause SERIOUS damage to a network or devices. Security Information and Event Management (SIEM) system.
https://www.ibm.com/think/topics/intrusion-detection-system
There are two primary detection methods…. Signature based detection which means it checks network packets for known patterns linked to specific threats by comparing them against a database of attack signatures and patterns. Anomaly based detection is the other, which uses machine learning to build a baseline of normal behavior and then flags anything that is far from it.
An IDS is different from a firewall in that it does not block traffic. It only observes and alerts, making it a passive BUT powerful and needed layer of defense that should be used in pairing with other tools.
https://www.geeksforgeeks.org/ethical-hacking/intrusion-detection-system-ids/
The place it has in Networking and Security?
Sits behind the firewall, monitoring internal and incoming traffic that passes through. Two main deployment types: Network based (NIDS) which monitors traffic across the entire network. And Host based (HIDS) monitors activity on individual machines and devices. Often paired with an Intrusion Prevention System (IPS), which takes the IDS a step further by also blocking detected threats in real time.
Used across corporate networks, data centers, government systems, and cloud environments
Why I want to Study this Topic:
IDS is something I've heard about and probably has helped me in plenty of ways but I don’t really know how it fully works and would love to understand at a deeper level. What interests me most is how anomaly based detection uses machine learning to catch threats that have no known signature yet.. One of the articles brings up a “zero day attack” which is an attack with no known comparable signature. It feels like the most technically advanced side of network defense, and learning how our networks help us against suspicious behavior would make me a much stronger networking student. IDS is also clearly evolving alongside AI, so studying it now feels relevant to where the WHOLE industry is heading.
CITATIONS:
Gillis, Alexander S. “What Is a VPN (Virtual Private Network)? Definition, Benefits & How It Works.” Search Networking, TechTarget, 15 Aug. 2024, www.techtarget.com/searchnetworking/definition/virtual-private-network. “Virtual Private Network - VPN.” GeeksforGeeks, GeeksforGeeks, 7 Feb. 2026, www.geeksforgeeks.org/computer-networks/what-is-vpn-how-it-works-types-of-vpn/. Ibm. “What Is an Intrusion Detection System (IDS)?” IBM, 17 Nov. 2025, www.ibm.com/think/topics/intrusion-detection-system. “Intrusion Detection System (IDS).” GeeksforGeeks, GeeksforGeeks, 11 July 2025, www.geeksforgeeks.org/ethical-hacking/intrusion-detection-system-ids/.