A Design of an Efficient, Robust, Autonomous and a well Coordinated Distributed Network Monitory System for Large Computer Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 4
Abstract
Information security assurance over networks is one of the key major issues facing the network infrastructure of organizations and information systems in today’s world. Data security and access control to information are issues of great importance in large scale networks. Network performance tracking and tracking of malicious activities over networks are of key importance in network management and network security. Because most organizations do not have a coordinated and autonomous network monitory centers at nodes within large computer networks, remote tracking of data becomes a challenge for them. Some organizations do real-time monitory over large networks from a centralized system and this affects the performance of the entire network and in some cases turned to be inefficient. Monitory and analysis of large data passing through nodes becomes a challenge if it is supposed to be done remotely over the network. This paper seeks to propose a method for designing efficient, robust, autonomous and a well coordinated distributed network monitory system for large computer Networks. The system consists of units or centers. These monitory centers are designed to have the capability of monitoring large amount of data passively and autonomously. They will also have the capability of collecting and analyzing data of interest as well as passing of information over to a parent monitory center for analysis if necessary. They can be used to monitor network performance and to passively monitor activities of targeted systems over the network.
Authors and Affiliations
Quist-Aphetsi Kester
Virtualizing the Private Cloud for Maximum Resource Utilization
Cloud computing ,now- a- days is a trend in the IT industry.We normally deploy cloud based infrastructure, applications on Bare-metal hardware. But still the resource utilization is not at its maximum .There is sti...
SEMANTIC BASED LEARNING APPROACH IN EDUCATION SYSTEM
Extensive Research works in the field of knowledge base Learning are represented by a broad spectrum of applications .Education system transform from class room system to E-Learning system which are ranged from virtual c...
ANALYSIS OF WAVELET TRANSFORM AND FAST WAVELET TRANSFORM FOR IMAGE COMPRESSION: REVIEW
A Detailed study of discrete wavelet transform and fast wavelet transform has been presented in this paper. Older techniques for image compression such as FFT and DCT have also been discussed. Wavelet analysis represents...
Scheme of security in Mobile Ad Hoc Networks using Route Blacklist Limit Mechanism
Routing protocols play an important role for communications in Mobile Ad Hoc Network Mobile Ad hoc Networks (MANET) has various types of Denial of Service Attacks (DoS) are possible because of the inherent limi...
Detection of Colluding Collision and Identity Delegation Attacks in Wireless Ad Hoc Networks via SADEC
The colluding collision and identity delegation attack comes under the new class of attacks of wireless ad hoc networks namely stealthy attacks that diminish the expense and sight of the invader. The nodes which are...