Submit Search
Upload
IRJET-Managing Security of Systems by Data Collection
•
0 likes
•
54 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i6/IRJET-V5I647.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
iFour Consultancy
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
VISTA InfoSec
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring Tools
IRJET Journal
Security and-visibility
Security and-visibility
edwardstudyemai
Splunk guide for_iso_27002
Splunk guide for_iso_27002
Greg Hanchin
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
iFour Consultancy
Modern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent Honeypot
IRJET Journal
Hipaa checklist - information security
Hipaa checklist - information security
Vijay Sekar
Recommended
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
iFour Consultancy
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
VISTA InfoSec
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring Tools
IRJET Journal
Security and-visibility
Security and-visibility
edwardstudyemai
Splunk guide for_iso_27002
Splunk guide for_iso_27002
Greg Hanchin
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
iFour Consultancy
Modern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent Honeypot
IRJET Journal
Hipaa checklist - information security
Hipaa checklist - information security
Vijay Sekar
IRJET - IDS for Wifi Security
IRJET - IDS for Wifi Security
IRJET Journal
Android-Based Secure Monitoring System for Industrial Power Plants
Android-Based Secure Monitoring System for Industrial Power Plants
IRJESJOURNAL
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
IJNSA Journal
Employee trust based industrial device
Employee trust based industrial device
IJNSA Journal
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
North Texas Chapter of the ISSA
Supplier security assessment questionnaire
Supplier security assessment questionnaire
Priyanka Aash
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
IRJET Journal
Nist 800 82
Nist 800 82
majolic
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
Eran Goldstein
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
IJECEIAES
Social Security Admin FISMA Audit
Social Security Admin FISMA Audit
David Sweigert
Intrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implement
IRJET Journal
IRJET- A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
IRJET Journal
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
vimal Kumar Gupta
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
IRJET Journal
Standards based security for energy utilities
Standards based security for energy utilities
Nirmal Thaliyil
Securing Industrial Control Systems
Securing Industrial Control Systems
Eric Andresen
Session Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior Recorder
BMST
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Priyanka Aash
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web Applications
IRJET Journal
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
IRJET Journal
More Related Content
What's hot
IRJET - IDS for Wifi Security
IRJET - IDS for Wifi Security
IRJET Journal
Android-Based Secure Monitoring System for Industrial Power Plants
Android-Based Secure Monitoring System for Industrial Power Plants
IRJESJOURNAL
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
IJNSA Journal
Employee trust based industrial device
Employee trust based industrial device
IJNSA Journal
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
North Texas Chapter of the ISSA
Supplier security assessment questionnaire
Supplier security assessment questionnaire
Priyanka Aash
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
IRJET Journal
Nist 800 82
Nist 800 82
majolic
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
Eran Goldstein
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
IJECEIAES
Social Security Admin FISMA Audit
Social Security Admin FISMA Audit
David Sweigert
Intrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implement
IRJET Journal
IRJET- A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
IRJET Journal
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
vimal Kumar Gupta
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
IRJET Journal
Standards based security for energy utilities
Standards based security for energy utilities
Nirmal Thaliyil
Securing Industrial Control Systems
Securing Industrial Control Systems
Eric Andresen
Session Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior Recorder
BMST
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Priyanka Aash
What's hot
(20)
IRJET - IDS for Wifi Security
IRJET - IDS for Wifi Security
Android-Based Secure Monitoring System for Industrial Power Plants
Android-Based Secure Monitoring System for Industrial Power Plants
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
Employee trust based industrial device
Employee trust based industrial device
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
Supplier security assessment questionnaire
Supplier security assessment questionnaire
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Nist 800 82
Nist 800 82
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
Social Security Admin FISMA Audit
Social Security Admin FISMA Audit
Intrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implement
IRJET- A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
Standards based security for energy utilities
Standards based security for energy utilities
Securing Industrial Control Systems
Securing Industrial Control Systems
Session Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior Recorder
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Similar to IRJET-Managing Security of Systems by Data Collection
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web Applications
IRJET Journal
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
IRJET Journal
A System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data Leak
IRJET Journal
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET Journal
Review on Honeypot Security
Review on Honeypot Security
IRJET Journal
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
IRJET Journal
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion Detection
IRJET Journal
IRJET- Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
IRJET Journal
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET Journal
IRJET -User Behaviour Analysis
IRJET -User Behaviour Analysis
IRJET Journal
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET Journal
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET Journal
Object Oriented Secure Modeling using SELinux Trusted Operating System
Object Oriented Secure Modeling using SELinux Trusted Operating System
Eswar Publications
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET Journal
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET Journal
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET Journal
Vulnerability Management System
Vulnerability Management System
IRJET Journal
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
IRJET Journal
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET Journal
Similar to IRJET-Managing Security of Systems by Data Collection
(20)
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web Applications
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
A System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data Leak
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
Review on Honeypot Security
Review on Honeypot Security
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET -User Behaviour Analysis
IRJET -User Behaviour Analysis
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
Object Oriented Secure Modeling using SELinux Trusted Operating System
Object Oriented Secure Modeling using SELinux Trusted Operating System
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
Vulnerability Management System
Vulnerability Management System
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection System
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Recently uploaded
(20)
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
power system scada applications and uses
power system scada applications and uses
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
IRJET-Managing Security of Systems by Data Collection
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 224 Managing Security of Systems by Data Collection Manisha. M. B1, Dr. D. K. Mallick2 1M.Tech Scholar, Dept. of Computer Science & Engineering, Birla Institute of Technology, Mesra, Jharkhand, India 2Associate Professor, Dept. of Computer Science & Engineering, Birla Institute of Technology, Mesra, Jharkhand, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – A computer system is as secure as the components maintaining the security of the system. In this paper, we see how to collect and manage dataofclientsystems using database server. In order to detect intrusion in the system, information related to security are defined and stored in the database. Based on the collected and analyzed information from each monitored system, we can know their status and take action according to it. Furthermore, we also discuss other security management techniques in this paper. Key Words: Intranet, Computer Network, Security Management, Security InformationCollection,Intrusion Detection 1. INTRODUCTION The growth of technology in this modern world is increasing day by day. In each field and organization, the need to protect their information stored digitally in the system has become critical. Thus, managing the security of these information, is the first thing any organization must look into. Information is an asset to all individuals and businesses. Information security is intended to ensure the confidentiality, integrity and availability (CIA) of computer system data from any malevolent intension. We can manage the security of information by collecting, monitoring and analysing security related data. An organization in today’s generation is generallyheavily dependent on its network infrastructure for achieving its desired goals. Computingisonlypossiblewiththeavailability of securenetwork. However, the realizationofsecurityliesin managing the services and integrated approach. Most organizations lack the ability to detect virus infection or vulnerable node. Every node (PC) needs to be managed through a centralized console to cater to all the requirements of IT compliance, viz. implementation, enforcement, monitoring and reporting. An application with this requirement would ensure that a database connected server gets all the intelligence of the health parameters of the nodes. Fear ofsecuritybreachesonInternetismakingcompanies useprivatenetworkstoprotectthemselves.ThoughIntranets are safer than Internet, it is not immune to vulnerability or attacks. Connecting virus infected external hard drive to a single computer in the Intranetwork can cause a widespread infection to connected computers if they are not managed. Our working environment will be Intranetwork with workstations, desktops and servers as our client system. Fig -1: Working Environment The aboveFig1showstheblockschematicrepresentation of our working environment. Application server, Antivirus Server, Asset Server and Offline Patch Management Server are connected through Intranetwork. We are creating an application which detects any change in the system as their details are collected regularly from the server. The tasks that the application does is documented and available for retrieving, disseminating, re-arranging and storing the same to database. While the server module will co-ordinate with other servers for data interchange so as to provide integration. The application reads registry contents, group policy settings, monitor security settings, send status to server on client health, update registry settings, etc. It would have to negotiate the Windows OS security layers to work smoothly. The behaviour of different OS should also be taken care of.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 225 This application also checks if the required patches and service packs are installed, if not it should be able to automatically install it. It is alsobi-directional i.e,abletotake commands and give the required output back to application server. It collects all security relayed information of clients and store them in database. These records are used to analyse and detect security issues. 2. METHODOLOGY In this paper, we are using Visual Studio to create an application whichwill getsysteminformationthrough which we can manage security of the system. We will be collecting data of each system, which will be useful to monitor and detect any unwantedcomponent.Theseinformationare sent to SQL Server to store them. Separateserversaremaintained to manage separate components as seen in Fig 1, so as to make it easier to manage. The main feature of our application which differs from other techniques is that, the communication between application and serverisbidirectional communication. Aswe are making the application bi-directional, we are not only able to collect the information of systems but also can send simple commands to it. We can command the application to get only one particular information we want or we can ask it stop collecting any information altogether. We have also added pause and resume features. Timer is one of the important feature of this application. We are adding interval timer to the application, so that we can collect the information according to the regular interval time it is set. By default the interval time is set to few minutes. As this is bidirectional application, we can change the interval time of a particular system using its IP Address. Some systems need to be monitored more regularly than others. So we can keep very less interval time for systems which we doubt may be vulnerable. We can use SQL Server of the application to change the interval timer. Every few seconds the application will be checking database for any new entry. When we insert only interval time, it will be applied to all the system having the application. If we insert IP Address along with the interval time, then only that system’s timer will be changed. Fig -2: Timer without IP Address In Fig 2, we see 30 seconds (30000 microseconds) being set as interval time to all the client systems as we are not providing any IP Address along with it. In the next figure, Fig 3, we are setting 30 seconds as interval time for system having IP Address (ending with) 36 and 50 seconds for system having IP Address 31. Fig -3: Timer without IP Address The application or monitoring server is connected and integrated with other servers as shown in Fig 4. Fig -4: Integrating all servers
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 226 Different servers maintaining different components of the system will be using different type of databases according to their prerequisites. Our application collects all the details required to analyze from these servers. It checks if there has been any unusual activity in the system. If any activity has occurred without the knowledge of user, it will either notify the administrator or store them in server. It checks themain three features to manage security: -Confidentiality,Integrity and Availability. If any vulnerable or unlicensed version of softwares are installed without the permission of administrator, it will be considered as intrusion and will be notified. The application will not be having any GUI. But the application will be running in backgroundandwill beshown by an icon in system tray as soon as it is installed. Once the application is installed, that system will be givenuniquevale in the database. Each system hosting the application will have unique values, through will it will be recognized. Only administrator has the right to uninstall the application. Before uninstalling, the application will send notification to the server and store the time in database. 3. RELATED WORK There exists many security management tools, each with its own techniques. In this section we are going to see some of these techniques, which helped us in creating our own technique for making an application. 3.1 Intrusion Detection System Intrusion Detection is the most commonlyusedtechnique to alert the vulnerability of the system or to detect when any unwanted component get inside our system. As soon as IDS detects malicious activity or policy violation, it is usually reported to either administrator or collected and stored in the server for analyzing and managing security of information. Intrusion detection system are classified into: Active IDS – is configured to prevent attacks without any external commands,assoonastheyare detected. Passive IDS – as opposed to active IDS, only monitors and detect attacks or intrusions if any found. Host IDS – can monitor only the systems where the software application (agents) are installed and it cannot check entire network for intrusion. Network IDS – is kept inside the network segment and monitors all the ingoing & outgoing traffic on network. In [1], advantages and disadvantages of each type of data collection mechanisms for intrusion detection system are discussed. The authors also mention how data collection is important as they are used to makedecision whethersystem is attacked or not. If the data is incorrect, it may affect IDS and give false sense of security. Intrusion Detection Systems are also classified based on their component distribution [2]: Centralized IDS – is the system where the analysis of information are done in a fixed number of location. Location of data collectiondoesnotmatter as long as we know the location of analysis. Distributed IDS – is the systemwheretheanalysisof information are done in more than one location based on number of hosts that are beingmonitored. 3.2 Security Management using Agent In [3], authors suggest security manager and agent to monitor and oppose intrusion to the system from outside. Security Agents defines security information and it collects them according to the security policy. Security Agent executed on local system. It collects information related to security, user information, group information and file information to make sure of the integrity of system files. These information are then sent to Security Manager, which analyses and gives the result. As the authors of [4] propose, Intelligent Agent are being used in different application areas and functionality. IA technology provides more efficient way in managing security. Their paper show how the multiple autonomous and intelligent agents communicate and use information to perform intrusion detection task efficiently. The agent is made to monitor all incoming and outgoing connections. It can trace intruder by shifting to the working host. The advantages of usingagentfor network managementis given in [5]. Some of them are: The agent handles queries by sending from clientto the server. It then carry out task and send the results back to client after completing it. Thus, only agents can be used to exchange information across the network, instead of results and information being sent back and forth. Agent architecturegivesmoreflexibilitybyallowing agent to visit several nodes on the network to carry out required tasks. Agent architecture also solves problems created by an unreliable network. For remote monitoring, this would be the best option. 3.3 Protecting Log Files Log files are one of the important things to consider while managing security of the system. [6] Mentions how to enhance network security by locking down logfiles.Logfiles record network traffic, IP Addresses trying to access the system through network, date and time of theattempt. Thus protecting log files to ensure security is important.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 227 Some of the ways to protect log files as mentioned in [6] are: Should not allow log files to be edited or delete information. Should be allowed only to appendnew data. Only system administrator must be given permission to configure log files. Applying password on log files or directory containing it 3.4 Client/Server Method Ad-hoc management and Centralized are the 2 approaches which use client/server model to manage network in [7]. Ad-hoc management approach uses a set of scripts which are written to focus on small tasks like calculating the load or checking configuration parameters. But this approach is very time consuming and expensive. Centralized approach uses single application to handle other areas for managing network. It is a very complex approach. 4. CONCLUSIONS We have reviewed other methods and technology, which helped us in creating our own technique. We conclude this paper bymentioningthatour methodgives a bi-directional approach, which is more effective andeasier to manage the security. We collect all security related information and store in database, so that therecordscanbe analyzed and compared to form a firm decision. Our application can deal actively when any security issues are detected. REFERENCES [1] Eugene Spafford and Diego Zamboni, “Data collection mechanisms for intrusion detection systems,” Prude University, CERIAS Tech Report 2000-08, June 2, 2000 [2] Eugene Spafford and Diego Zamboni, “Intrusion detection using autonomous agents,” ELSEVIER, Computer Networks 34 (2000) 547-570, 2000. [3] Soon Choul Kim, Young Su Choi and Jin Wook Chung, “Study of Security Management System based on Client/Server model,” ICC 1999 - IEEE International Conference on Communications, no. 1, June 1999 pp. 1403-1408. [4] K. Boudaoud, N. Agoulmine and J.N De Souza, “Distributed Network Security Management Using Intelligent Agents, “LANOMS, 1999. [5] W.J. Buchanan, M. Naylor and A.V. Scott, “Enhancing Network Management using Mobile Agents,” IEEE International Conference on Engineering of Computer Based Systems, 2000. [6] B Lantz, R Hall, J Couraud, “Locking Down Log Files: Enhancing Network Security By Protecting Log Files,” IACIS, Issues in Information Systems, 2006. [7] Osman Ertugay, Michael Hicks, Jonathan M. Smith and Jessica Kornblum, “Agents in Network Management,” University of Pennsylvania Scholarly Commons, Technical Reports (CIS), Feb 2000.
Download now