A Critical Study of the Content Analysis on Networks for Monitoring and Security

Vol-3 | Issue-07 | July 2018 | Published Online: 05 July 2018    PDF ( 429 KB )
Author(s)
Devajit Mahanta 1; Dr. Ashish Chaturvedi 2

1Research Scholar, Kalinga University, Raipur, Chhattishgarh

2Associate Professor, Kalinga University, Raipur, Chhattishgarh

Abstract

This research work can be further applied to algorithms for change-point detection that can be used to identify and isolate the change in a traffic statistic triggered by attacks. Initially, by address, port or protocol, they filter the target traffic data and store the resulting flow as a time series. E.g. E.g. The deviations in the real versus expected local average in the traffic time series can be detected based on known statistics to detect and localise a DoS attack. It can also be used to classify the network worms' standard scanning activities. To evaluate whether network traffic can be repeated by constructing network topologies and collecting data from them, network simulation tools such as GNS3 and ns2/ns3 have been tried. We can telescope the time to create the baseline data for a network and minimize efforts and resources in the gambit, if it is possible to simulate our performance. However, with the present limitations in the simulation software and the replication of network system behaviour, it was possible to reproduce the topologies of the network in part. A new systematic and comprehensive approach to network monitoring has been built from a security perspective. The study defined essential and fundamental parameters of network communication and protocols for consideration from a security perspective for network monitoring.

Keywords
Domain Name System, Security, network, public domain
Statistics
Article View: 284