SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 224
Managing Security of Systems by Data Collection
Manisha. M. B1, Dr. D. K. Mallick2
1M.Tech Scholar, Dept. of Computer Science & Engineering, Birla Institute of Technology, Mesra, Jharkhand, India
2Associate Professor, Dept. of Computer Science & Engineering, Birla Institute of Technology, Mesra, Jharkhand,
India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – A computer system is as secure as the
components maintaining the security of the system. In this
paper, we see how to collect and manage dataofclientsystems
using database server. In order to detect intrusion in the
system, information related to security are defined and stored
in the database. Based on the collected and analyzed
information from each monitored system, we can know their
status and take action according to it. Furthermore, we also
discuss other security management techniques in this paper.
Key Words: Intranet, Computer Network, Security
Management, Security InformationCollection,Intrusion
Detection
1. INTRODUCTION
The growth of technology in this modern world is
increasing day by day. In each field and organization, the
need to protect their information stored digitally in the
system has become critical. Thus, managing the security of
these information, is the first thing any organization must
look into.
Information is an asset to all individuals and businesses.
Information security is intended to ensure the
confidentiality, integrity and availability (CIA) of computer
system data from any malevolent intension. We can manage
the security of information by collecting, monitoring and
analysing security related data.
An organization in today’s generation is generallyheavily
dependent on its network infrastructure for achieving its
desired goals. Computingisonlypossiblewiththeavailability
of securenetwork. However, the realizationofsecurityliesin
managing the services and integrated approach. Most
organizations lack the ability to detect virus infection or
vulnerable node.
Every node (PC) needs to be managed through a
centralized console to cater to all the requirements of IT
compliance, viz. implementation, enforcement, monitoring
and reporting. An application with this requirement would
ensure that a database connected server gets all the
intelligence of the health parameters of the nodes.
Fear ofsecuritybreachesonInternetismakingcompanies
useprivatenetworkstoprotectthemselves.ThoughIntranets
are safer than Internet, it is not immune to vulnerability or
attacks. Connecting virus infected external hard drive to a
single computer in the Intranetwork can cause a widespread
infection to connected computers if they are not managed.
Our working environment will be Intranetwork with
workstations, desktops and servers as our client system.
Fig -1: Working Environment
The aboveFig1showstheblockschematicrepresentation
of our working environment. Application server, Antivirus
Server, Asset Server and Offline Patch Management Server
are connected through Intranetwork.
We are creating an application which detects any change
in the system as their details are collected regularly from the
server. The tasks that the application does is documented
and available for retrieving, disseminating, re-arranging and
storing the same to database. While the server module will
co-ordinate with other servers for data interchange so as to
provide integration.
The application reads registry contents, group policy
settings, monitor security settings, send status to server on
client health, update registry settings, etc. It would have to
negotiate the Windows OS security layers to work smoothly.
The behaviour of different OS should also be taken care of.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 225
This application also checks if the required patches and
service packs are installed, if not it should be able to
automatically install it. It is alsobi-directional i.e,abletotake
commands and give the required output back to application
server. It collects all security relayed information of clients
and store them in database. These records are used to
analyse and detect security issues.
2. METHODOLOGY
In this paper, we are using Visual Studio to create an
application whichwill getsysteminformationthrough which
we can manage security of the system. We will be collecting
data of each system, which will be useful to monitor and
detect any unwantedcomponent.Theseinformationare sent
to SQL Server to store them. Separateserversaremaintained
to manage separate components as seen in Fig 1, so as to
make it easier to manage.
The main feature of our application which differs from
other techniques is that, the communication between
application and serverisbidirectional communication. Aswe
are making the application bi-directional, we are not only
able to collect the information of systems but also can send
simple commands to it. We can command the application to
get only one particular information we want or we can ask it
stop collecting any information altogether. We have also
added pause and resume features.
Timer is one of the important feature of this application.
We are adding interval timer to the application, so that we
can collect the information according to the regular interval
time it is set. By default the interval time is set to few
minutes. As this is bidirectional application, we can change
the interval time of a particular system using its IP Address.
Some systems need to be monitored more regularly than
others. So we can keep very less interval time for systems
which we doubt may be vulnerable. We can use SQL Server
of the application to change the interval timer. Every few
seconds the application will be checking database for any
new entry. When we insert only interval time, it will be
applied to all the system having the application. If we insert
IP Address along with the interval time, then only that
system’s timer will be changed.
Fig -2: Timer without IP Address
In Fig 2, we see 30 seconds (30000 microseconds) being
set as interval time to all the client systems as we are not
providing any IP Address along with it.
In the next figure, Fig 3, we are setting 30 seconds as
interval time for system having IP Address (ending with)
36 and 50 seconds for system having IP Address 31.
Fig -3: Timer without IP Address
The application or monitoring server is connected and
integrated with other servers as shown in Fig 4.
Fig -4: Integrating all servers
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 226
Different servers maintaining different components of the
system will be using different type of databases according to
their prerequisites. Our application collects all the details
required to analyze from these servers. It checks if there has
been any unusual activity in the system. If any activity has
occurred without the knowledge of user, it will either notify
the administrator or store them in server. It checks themain
three features to manage security: -Confidentiality,Integrity
and Availability. If any vulnerable or unlicensed version of
softwares are installed without the permission of
administrator, it will be considered as intrusion and will be
notified.
The application will not be having any GUI. But the
application will be running in backgroundandwill beshown
by an icon in system tray as soon as it is installed. Once the
application is installed, that system will be givenuniquevale
in the database. Each system hosting the application will
have unique values, through will it will be recognized. Only
administrator has the right to uninstall the application.
Before uninstalling, the application will send notification to
the server and store the time in database.
3. RELATED WORK
There exists many security management tools, each with its
own techniques. In this section we are going to see some of
these techniques, which helped us in creating our own
technique for making an application.
3.1 Intrusion Detection System
Intrusion Detection is the most commonlyusedtechnique
to alert the vulnerability of the system or to detect when any
unwanted component get inside our system. As soon as IDS
detects malicious activity or policy violation, it is usually
reported to either administrator or collected and stored in
the server for analyzing and managing security of
information.
Intrusion detection system are classified into:
 Active IDS – is configured to prevent attacks
without any external commands,assoonastheyare
detected.
 Passive IDS – as opposed to active IDS, only
monitors and detect attacks or intrusions if any
found.
 Host IDS – can monitor only the systems where the
software application (agents) are installed and it
cannot check entire network for intrusion.
 Network IDS – is kept inside the network segment
and monitors all the ingoing & outgoing traffic on
network.
In [1], advantages and disadvantages of each type of data
collection mechanisms for intrusion detection system are
discussed. The authors also mention how data collection is
important as they are used to makedecision whethersystem
is attacked or not. If the data is incorrect, it may affect IDS
and give false sense of security.
Intrusion Detection Systems are also classified based on
their component distribution [2]:
 Centralized IDS – is the system where the analysis
of information are done in a fixed number of
location. Location of data collectiondoesnotmatter
as long as we know the location of analysis.
 Distributed IDS – is the systemwheretheanalysisof
information are done in more than one location
based on number of hosts that are beingmonitored.
3.2 Security Management using Agent
In [3], authors suggest security manager and agent to
monitor and oppose intrusion to the system from outside.
Security Agents defines security information and it collects
them according to the security policy.
Security Agent executed on local system. It collects
information related to security, user information, group
information and file information to make sure of the
integrity of system files. These information are then sent to
Security Manager, which analyses and gives the result.
As the authors of [4] propose, Intelligent Agent are being
used in different application areas and functionality. IA
technology provides more efficient way in managing
security. Their paper show how the multiple autonomous
and intelligent agents communicate and use information to
perform intrusion detection task efficiently. The agent is
made to monitor all incoming and outgoing connections. It
can trace intruder by shifting to the working host.
The advantages of usingagentfor network managementis
given in [5]. Some of them are:
 The agent handles queries by sending from clientto
the server. It then carry out task and send the
results back to client after completing it. Thus, only
agents can be used to exchange information across
the network, instead of results and information
being sent back and forth.
 Agent architecturegivesmoreflexibilitybyallowing
agent to visit several nodes on the network to carry
out required tasks.
 Agent architecture also solves problems created by
an unreliable network. For remote monitoring, this
would be the best option.
3.3 Protecting Log Files
Log files are one of the important things to consider while
managing security of the system. [6] Mentions how to
enhance network security by locking down logfiles.Logfiles
record network traffic, IP Addresses trying to access the
system through network, date and time of theattempt. Thus
protecting log files to ensure security is important.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 227
Some of the ways to protect log files as mentioned in [6] are:
 Should not allow log files to be edited or delete
information. Should be allowed only to appendnew
data.
 Only system administrator must be given
permission to configure log files.
 Applying password on log files or directory
containing it
3.4 Client/Server Method
Ad-hoc management and Centralized are the 2
approaches which use client/server model to manage
network in [7].
 Ad-hoc management approach uses a set of scripts
which are written to focus on small tasks like
calculating the load or checking configuration
parameters. But this approach is very time
consuming and expensive.
 Centralized approach uses single application to
handle other areas for managing network. It is a
very complex approach.
4. CONCLUSIONS
We have reviewed other methods and technology, which
helped us in creating our own technique.
We conclude this paper bymentioningthatour methodgives
a bi-directional approach, which is more effective andeasier
to manage the security. We collect all security related
information and store in database, so that therecordscanbe
analyzed and compared to form a firm decision. Our
application can deal actively when any security issues are
detected.
REFERENCES
[1] Eugene Spafford and Diego Zamboni, “Data collection
mechanisms for intrusion detection systems,” Prude
University, CERIAS Tech Report 2000-08, June 2, 2000
[2] Eugene Spafford and Diego Zamboni, “Intrusion
detection using autonomous agents,” ELSEVIER,
Computer Networks 34 (2000) 547-570, 2000.
[3] Soon Choul Kim, Young Su Choi and Jin Wook Chung,
“Study of Security Management System based on
Client/Server model,” ICC 1999 - IEEE International
Conference on Communications, no. 1, June 1999 pp.
1403-1408.
[4] K. Boudaoud, N. Agoulmine and J.N De Souza,
“Distributed Network Security Management Using
Intelligent Agents, “LANOMS, 1999.
[5] W.J. Buchanan, M. Naylor and A.V. Scott, “Enhancing
Network Management using Mobile Agents,” IEEE
International Conference on Engineering of Computer
Based Systems, 2000.
[6] B Lantz, R Hall, J Couraud, “Locking Down Log Files:
Enhancing Network Security By Protecting Log Files,”
IACIS, Issues in Information Systems, 2006.
[7] Osman Ertugay, Michael Hicks, Jonathan M. Smith and
Jessica Kornblum, “Agents in Network Management,”
University of Pennsylvania Scholarly Commons,
Technical Reports (CIS), Feb 2000.

More Related Content

What's hot

IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
Android-Based Secure Monitoring System for Industrial Power Plants
Android-Based Secure Monitoring System for Industrial Power PlantsAndroid-Based Secure Monitoring System for Industrial Power Plants
Android-Based Secure Monitoring System for Industrial Power PlantsIRJESJOURNAL
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial deviceIJNSA Journal
 
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNorth Texas Chapter of the ISSA
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnairePriyanka Aash
 
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetAugment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetIRJET Journal
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82majolic
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...Eran Goldstein
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices IJECEIAES
 
Social Security Admin FISMA Audit
Social Security Admin FISMA AuditSocial Security Admin FISMA Audit
Social Security Admin FISMA AuditDavid Sweigert
 
Intrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implementIntrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implementIRJET Journal
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection SystemIRJET Journal
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327vimal Kumar Gupta
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsIRJET Journal
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
Securing Industrial Control Systems
Securing Industrial Control SystemsSecuring Industrial Control Systems
Securing Industrial Control SystemsEric Andresen
 
Session Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior RecorderSession Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior RecorderBMST
 
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101Priyanka Aash
 

What's hot (20)

IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
Android-Based Secure Monitoring System for Industrial Power Plants
Android-Based Secure Monitoring System for Industrial Power PlantsAndroid-Based Secure Monitoring System for Industrial Power Plants
Android-Based Secure Monitoring System for Industrial Power Plants
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial device
 
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnaire
 
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetAugment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
 
Social Security Admin FISMA Audit
Social Security Admin FISMA AuditSocial Security Admin FISMA Audit
Social Security Admin FISMA Audit
 
Intrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implementIntrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implement
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Securing Industrial Control Systems
Securing Industrial Control SystemsSecuring Industrial Control Systems
Securing Industrial Control Systems
 
Session Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior RecorderSession Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior Recorder
 
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
 

Similar to IRJET-Managing Security of Systems by Data Collection

Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsIRJET Journal
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsIRJET Journal
 
A System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data LeakA System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data LeakIRJET Journal
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Review on Honeypot Security
Review on Honeypot SecurityReview on Honeypot Security
Review on Honeypot SecurityIRJET Journal
 
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership FunctionDetecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership FunctionIRJET Journal
 
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion DetectionIRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion DetectionIRJET Journal
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing SuiteIRJET Journal
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”IRJET Journal
 
IRJET -User Behaviour Analysis
IRJET -User Behaviour AnalysisIRJET -User Behaviour Analysis
IRJET -User Behaviour AnalysisIRJET Journal
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
Object Oriented Secure Modeling using SELinux Trusted Operating System
Object Oriented Secure Modeling using SELinux Trusted Operating SystemObject Oriented Secure Modeling using SELinux Trusted Operating System
Object Oriented Secure Modeling using SELinux Trusted Operating SystemEswar Publications
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET Journal
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management SystemIRJET Journal
 
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkPrivate and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkIRJET Journal
 
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection SystemIRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection SystemIRJET Journal
 

Similar to IRJET-Managing Security of Systems by Data Collection (20)

Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web Applications
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
 
A System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data LeakA System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data Leak
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Review on Honeypot Security
Review on Honeypot SecurityReview on Honeypot Security
Review on Honeypot Security
 
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership FunctionDetecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
 
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion DetectionIRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion Detection
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
 
IRJET -User Behaviour Analysis
IRJET -User Behaviour AnalysisIRJET -User Behaviour Analysis
IRJET -User Behaviour Analysis
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
Object Oriented Secure Modeling using SELinux Trusted Operating System
Object Oriented Secure Modeling using SELinux Trusted Operating SystemObject Oriented Secure Modeling using SELinux Trusted Operating System
Object Oriented Secure Modeling using SELinux Trusted Operating System
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkPrivate and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
 
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection SystemIRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection System
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 

Recently uploaded (20)

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 

IRJET-Managing Security of Systems by Data Collection

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 224 Managing Security of Systems by Data Collection Manisha. M. B1, Dr. D. K. Mallick2 1M.Tech Scholar, Dept. of Computer Science & Engineering, Birla Institute of Technology, Mesra, Jharkhand, India 2Associate Professor, Dept. of Computer Science & Engineering, Birla Institute of Technology, Mesra, Jharkhand, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – A computer system is as secure as the components maintaining the security of the system. In this paper, we see how to collect and manage dataofclientsystems using database server. In order to detect intrusion in the system, information related to security are defined and stored in the database. Based on the collected and analyzed information from each monitored system, we can know their status and take action according to it. Furthermore, we also discuss other security management techniques in this paper. Key Words: Intranet, Computer Network, Security Management, Security InformationCollection,Intrusion Detection 1. INTRODUCTION The growth of technology in this modern world is increasing day by day. In each field and organization, the need to protect their information stored digitally in the system has become critical. Thus, managing the security of these information, is the first thing any organization must look into. Information is an asset to all individuals and businesses. Information security is intended to ensure the confidentiality, integrity and availability (CIA) of computer system data from any malevolent intension. We can manage the security of information by collecting, monitoring and analysing security related data. An organization in today’s generation is generallyheavily dependent on its network infrastructure for achieving its desired goals. Computingisonlypossiblewiththeavailability of securenetwork. However, the realizationofsecurityliesin managing the services and integrated approach. Most organizations lack the ability to detect virus infection or vulnerable node. Every node (PC) needs to be managed through a centralized console to cater to all the requirements of IT compliance, viz. implementation, enforcement, monitoring and reporting. An application with this requirement would ensure that a database connected server gets all the intelligence of the health parameters of the nodes. Fear ofsecuritybreachesonInternetismakingcompanies useprivatenetworkstoprotectthemselves.ThoughIntranets are safer than Internet, it is not immune to vulnerability or attacks. Connecting virus infected external hard drive to a single computer in the Intranetwork can cause a widespread infection to connected computers if they are not managed. Our working environment will be Intranetwork with workstations, desktops and servers as our client system. Fig -1: Working Environment The aboveFig1showstheblockschematicrepresentation of our working environment. Application server, Antivirus Server, Asset Server and Offline Patch Management Server are connected through Intranetwork. We are creating an application which detects any change in the system as their details are collected regularly from the server. The tasks that the application does is documented and available for retrieving, disseminating, re-arranging and storing the same to database. While the server module will co-ordinate with other servers for data interchange so as to provide integration. The application reads registry contents, group policy settings, monitor security settings, send status to server on client health, update registry settings, etc. It would have to negotiate the Windows OS security layers to work smoothly. The behaviour of different OS should also be taken care of.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 225 This application also checks if the required patches and service packs are installed, if not it should be able to automatically install it. It is alsobi-directional i.e,abletotake commands and give the required output back to application server. It collects all security relayed information of clients and store them in database. These records are used to analyse and detect security issues. 2. METHODOLOGY In this paper, we are using Visual Studio to create an application whichwill getsysteminformationthrough which we can manage security of the system. We will be collecting data of each system, which will be useful to monitor and detect any unwantedcomponent.Theseinformationare sent to SQL Server to store them. Separateserversaremaintained to manage separate components as seen in Fig 1, so as to make it easier to manage. The main feature of our application which differs from other techniques is that, the communication between application and serverisbidirectional communication. Aswe are making the application bi-directional, we are not only able to collect the information of systems but also can send simple commands to it. We can command the application to get only one particular information we want or we can ask it stop collecting any information altogether. We have also added pause and resume features. Timer is one of the important feature of this application. We are adding interval timer to the application, so that we can collect the information according to the regular interval time it is set. By default the interval time is set to few minutes. As this is bidirectional application, we can change the interval time of a particular system using its IP Address. Some systems need to be monitored more regularly than others. So we can keep very less interval time for systems which we doubt may be vulnerable. We can use SQL Server of the application to change the interval timer. Every few seconds the application will be checking database for any new entry. When we insert only interval time, it will be applied to all the system having the application. If we insert IP Address along with the interval time, then only that system’s timer will be changed. Fig -2: Timer without IP Address In Fig 2, we see 30 seconds (30000 microseconds) being set as interval time to all the client systems as we are not providing any IP Address along with it. In the next figure, Fig 3, we are setting 30 seconds as interval time for system having IP Address (ending with) 36 and 50 seconds for system having IP Address 31. Fig -3: Timer without IP Address The application or monitoring server is connected and integrated with other servers as shown in Fig 4. Fig -4: Integrating all servers
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 226 Different servers maintaining different components of the system will be using different type of databases according to their prerequisites. Our application collects all the details required to analyze from these servers. It checks if there has been any unusual activity in the system. If any activity has occurred without the knowledge of user, it will either notify the administrator or store them in server. It checks themain three features to manage security: -Confidentiality,Integrity and Availability. If any vulnerable or unlicensed version of softwares are installed without the permission of administrator, it will be considered as intrusion and will be notified. The application will not be having any GUI. But the application will be running in backgroundandwill beshown by an icon in system tray as soon as it is installed. Once the application is installed, that system will be givenuniquevale in the database. Each system hosting the application will have unique values, through will it will be recognized. Only administrator has the right to uninstall the application. Before uninstalling, the application will send notification to the server and store the time in database. 3. RELATED WORK There exists many security management tools, each with its own techniques. In this section we are going to see some of these techniques, which helped us in creating our own technique for making an application. 3.1 Intrusion Detection System Intrusion Detection is the most commonlyusedtechnique to alert the vulnerability of the system or to detect when any unwanted component get inside our system. As soon as IDS detects malicious activity or policy violation, it is usually reported to either administrator or collected and stored in the server for analyzing and managing security of information. Intrusion detection system are classified into:  Active IDS – is configured to prevent attacks without any external commands,assoonastheyare detected.  Passive IDS – as opposed to active IDS, only monitors and detect attacks or intrusions if any found.  Host IDS – can monitor only the systems where the software application (agents) are installed and it cannot check entire network for intrusion.  Network IDS – is kept inside the network segment and monitors all the ingoing & outgoing traffic on network. In [1], advantages and disadvantages of each type of data collection mechanisms for intrusion detection system are discussed. The authors also mention how data collection is important as they are used to makedecision whethersystem is attacked or not. If the data is incorrect, it may affect IDS and give false sense of security. Intrusion Detection Systems are also classified based on their component distribution [2]:  Centralized IDS – is the system where the analysis of information are done in a fixed number of location. Location of data collectiondoesnotmatter as long as we know the location of analysis.  Distributed IDS – is the systemwheretheanalysisof information are done in more than one location based on number of hosts that are beingmonitored. 3.2 Security Management using Agent In [3], authors suggest security manager and agent to monitor and oppose intrusion to the system from outside. Security Agents defines security information and it collects them according to the security policy. Security Agent executed on local system. It collects information related to security, user information, group information and file information to make sure of the integrity of system files. These information are then sent to Security Manager, which analyses and gives the result. As the authors of [4] propose, Intelligent Agent are being used in different application areas and functionality. IA technology provides more efficient way in managing security. Their paper show how the multiple autonomous and intelligent agents communicate and use information to perform intrusion detection task efficiently. The agent is made to monitor all incoming and outgoing connections. It can trace intruder by shifting to the working host. The advantages of usingagentfor network managementis given in [5]. Some of them are:  The agent handles queries by sending from clientto the server. It then carry out task and send the results back to client after completing it. Thus, only agents can be used to exchange information across the network, instead of results and information being sent back and forth.  Agent architecturegivesmoreflexibilitybyallowing agent to visit several nodes on the network to carry out required tasks.  Agent architecture also solves problems created by an unreliable network. For remote monitoring, this would be the best option. 3.3 Protecting Log Files Log files are one of the important things to consider while managing security of the system. [6] Mentions how to enhance network security by locking down logfiles.Logfiles record network traffic, IP Addresses trying to access the system through network, date and time of theattempt. Thus protecting log files to ensure security is important.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 227 Some of the ways to protect log files as mentioned in [6] are:  Should not allow log files to be edited or delete information. Should be allowed only to appendnew data.  Only system administrator must be given permission to configure log files.  Applying password on log files or directory containing it 3.4 Client/Server Method Ad-hoc management and Centralized are the 2 approaches which use client/server model to manage network in [7].  Ad-hoc management approach uses a set of scripts which are written to focus on small tasks like calculating the load or checking configuration parameters. But this approach is very time consuming and expensive.  Centralized approach uses single application to handle other areas for managing network. It is a very complex approach. 4. CONCLUSIONS We have reviewed other methods and technology, which helped us in creating our own technique. We conclude this paper bymentioningthatour methodgives a bi-directional approach, which is more effective andeasier to manage the security. We collect all security related information and store in database, so that therecordscanbe analyzed and compared to form a firm decision. Our application can deal actively when any security issues are detected. REFERENCES [1] Eugene Spafford and Diego Zamboni, “Data collection mechanisms for intrusion detection systems,” Prude University, CERIAS Tech Report 2000-08, June 2, 2000 [2] Eugene Spafford and Diego Zamboni, “Intrusion detection using autonomous agents,” ELSEVIER, Computer Networks 34 (2000) 547-570, 2000. [3] Soon Choul Kim, Young Su Choi and Jin Wook Chung, “Study of Security Management System based on Client/Server model,” ICC 1999 - IEEE International Conference on Communications, no. 1, June 1999 pp. 1403-1408. [4] K. Boudaoud, N. Agoulmine and J.N De Souza, “Distributed Network Security Management Using Intelligent Agents, “LANOMS, 1999. [5] W.J. Buchanan, M. Naylor and A.V. Scott, “Enhancing Network Management using Mobile Agents,” IEEE International Conference on Engineering of Computer Based Systems, 2000. [6] B Lantz, R Hall, J Couraud, “Locking Down Log Files: Enhancing Network Security By Protecting Log Files,” IACIS, Issues in Information Systems, 2006. [7] Osman Ertugay, Michael Hicks, Jonathan M. Smith and Jessica Kornblum, “Agents in Network Management,” University of Pennsylvania Scholarly Commons, Technical Reports (CIS), Feb 2000.