SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2598
Webhook Support for Alert Policies
1 K Anjani Vaibhavi, 2 Anala M R
1,2 Department of Information Science and Engineering, R V College of Engineering, Bangalore, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Corporate employees havenumerousduties, and
yet no matter how many activities they must complete on a
daily basis, confidentiality and reliability is usually alwaysthe
top priority. Assurance that one's system and its assets are
secure from public and cybersecurity hazards is essential in
the business world — and as a result, the capacity to offer
real-time notifications to customers may seriously affect any
firm. One must act quickly to halt a continuing event before it
causes permanent damage to your networks and resources.
Alerts are a medium of communication between a system and
its user. Alerting allows individuals to stay up to date on the
information that is important to them. An alert system that is
efficient, secure, and dependablelowersthecostofexchanging
goods and services.
Key Words: Webhook, alerts, Reactjs, graphql, webhook testing
1.INTRODUCTION
In the field of cyber security, alert notifications are amongst
the most significant data resources. These alert andtell your
Technology staff regarding the current hacking attacks,
suspicious activities, and every other issue that may
endanger your firm and which is why alerts are vital for the
firm's safety. Alert system contains notifications that notify
customers of critical security issues or dangers to one's
device or intranet. It is critical for a company's security
personnel to intervene swiftly in numerous security
situations and manage any dangers while these pose major
difficulties.
1.1 Alert Notification Systems
Alerts are messages that warnyouofseveresecurity
concerns or risks to any device or software. It is critical for
the IT personnel to respond promptly in different security
related events and control any dangers before they trigger
major difficulties.
An alert notification service's principal role or goal is to
swiftly warn personnel of possible dangers or exceptional
circumstances and to offer guidance about how to react to
such concerns. It is essentialthatanyfirmshouldfollowthese
alerts or concerns and warn the customers to achieve a
reliable and safe network and devices.
1.2 Webhooks
Webhooks are notifications that are sentautomaticallyby
applications when any problem occurs. They contain
content, or payload, and are delivered to a custom Domain,
which is effectively the app's contact information or email.
Webhooks are usually quicker and involve minimal effort on
the user side.
Applications and organizations can use webhooks to
transmit automatic messages and data to different services.
These are an effective way for any system to communicate
with one another and be automatically alerted when
anything important occurs. Webhooks allow users to send
content through one application to another seamlessly.
The objective behind this work is to integrate the alert
notifications with webhooks for the user to automatically
receive messages in case of any issues or security breaches
and the benefits of the following integration. A method to
integrate the alert notification system and the webhooks is
shown
2. RELATED WORKS
The subject of alert notifications and webhooks is a modern
way of warning the users about the critical issues. In this
section, several relevant and well-known papers are studied
to understand what the present systems offer and how they
operate.
The author of [1] describes several effective techniques for
addressingsimilar issues insidethe project,henceimproving
the efficiency of the ReactJS App in a chain of processes. It
also presents a time-efficient research approach for finding
items in a huge data collection. In [2] the authors paper
provided a method for monitoring the implementation of
communal acts on Fb as well as the performanceofcorporate
duties. Combining activities like posting and commenting
progress in the developmentofsocialstreams.Webhooksare
used to "watch" to updates that occur on Facebook profiles.
Various GraphQL query processing algorithms are assessed
and their efficacy was evaluated while handling only with
N+1 issue in [3]. [4] explains a modular approach which
could present customers' PHR quickly combining GraphQL
and React Native, and therefore how utilising graphql in a
clinical diagnostics may enable api calls faster, simpler, and
more economic. The authors introduce in [5], how an
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2599
artificially intelligent agent may do this work rather than
people directly accessing the internet and provide data as if
the webpage had deployed an useability. They discussed the
specifics and merits of this structure.
In [6], the author suggested amethodhasavoidedtheneedof
costly monitoring devices as feed and alert system ways. It
has been able to discern movements and snap photos, and
also send Alert messages through GSM along with e-mail
notifications linked to the picture or file. In[7], the authors
discussedabouthowthealertnotificationservicebenefitsthe
users or clients in getting the required information from the
services.
The proposed alert notification system integrates alert
policies by sending warning messages by following methods
like emails or webhooks.
3. BENEFITS OF ALERT NOTIFICATION SYSTEM
A. Customizable messages
Webhooks are integrated with a payload which allows the
user to customize the contentofthenotificationthatissentto
the domain address. This lets the user to send the
appropriate message according to the alert policy and type.
B. Computerized Alerting and responses
If a problem is ignored, the warning system immediately
alerts the appropriate staff members or selected people
based on a specified on-call schedule or the stated webhook,
and escalates to higher standards of protection.
C. Simple Incorporation
Because modern IT infrastructures are so complicated, it's
critical to choose a service that is simple to self-serve and
interact with. This furthermore enhances the ROI of existing
and emerging IT expenditures by allowing information to be
shared more effectively between platforms and remote
personnel.
D. Monitoring and Accounting
Alert and issue monitoring, auditing, and monitoring are
critical tools for assisting groups in determining from which
one can improve performance and effectiveness by
optimizingresponseprocedures,fine-tuningincidenttriggers
and notifying, and perhaps more.
E. High Availability and Reliability
Since dependable monitoring is so vital, it's essential to
engage in a platform that has organization structural
resilience or scalability to avoid exposing the organizationto
hazards. An alerting system should be available and comply
with tight Service level agreements, thus it is critical to
choose a provider that is open around its backup and does
not have planned service periods.
4. METHODOLOGY
An alert notification system should inform on all sorts of
warningsand issues that happened inone'ssystemrelatedto
unit procurement, setup, and data access. Consumers get the
choice of sending an email to the relevant team personnel or
using Webhooks as a transportation mechanism whenever
these prompts occur when establishing these Alerts &
Occurrences. This may be incredibly valuable for developing
efficient event-driven processes, interactingwithsomeother
3rd party apps, or troubleshooting the systems and intranet.
In the proposed system the alert notificationsystemcontains
different alertpolicies.Eachalertpolicycanbecategorizedby
their type and is integrated with two options - a) Sending
email to admins or appropriate team personnel b) Notifying
via webhooks. These alert policieshelptheuserstoknowany
critical issues occured. Fig 1 shows the basic architecture of
the alert notification system.
Fig-1 : Architecture of alert notification system
a) Webhook Structure
Each webhook is associated with aurlandapayload.Payload
contains the information about it. In general it can contain
wbhook_body, webhook_id, webhook_headers and other
information describing the webhook.
b) Email Administrators / Personnel
An email can be sent to the required or selected
administrators/ personnel using customised HTML emails
when an alert is triggered.
c) Using Webhooks
Whenever a Warning is set tosend as a Webhooknotification
to the client, the notification is sent as a JSON formatted text
usinga POST request. The returned object has multiplefields
, that JSON object provides data on the policy involved, the
severity of the warning, and other facts and attributes.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2600
d) Test the webhook profile
On clicking the test button after selecting the webhook, the
‘text’ part of the body entered is sent to the platform chosen
as a notification/message.
e) Save Changes
After the entire process, the user is given an option of saving
the changes he made, on clicking this, the changes are made
and saved into the api. Thesechangesreflectwhenthepageis
again opened for further use.
f) Alert policy fields
Every alert policy can contain a special field like
webhook_profile_idandwebhook_profile_payloadintegrated
with the certain alert policy. Every time an alert occurs the
warning is sent to that particular webhook url using the
webhook_id associated with it and alsopayloadwithitissent
as the body of the content. This alert policy can be modified
to select a particular webhook from the available ones and
the content can be changed and saved.
Integration of ReactJS,graphQLandnodeJSmakesthesystem
more efficient. GraphQl can make queries to only get the
required information from the api, rather than everything.
Figure 2 shows the flowchart of an alert notification system.
5. RESULTS AND ANALYSIS
The alert notification system provides an easy and efficient
to communicate with clients or personnel regarding critical
issues in the system. The options of notify webhook and
email admin(s)/notify webhook can be added to the alert
policy.
The available webhook profiles are listed in a dropdown for
the user to select and also an option to create a new profile
can be given. The selected webhook profile displays the
details of it such as method, url, headers and body.
The webhook body is made editable for user to send the
required payload and validate it. A new field
$format_alert_msg can be added to the webhook to get the
customized payload which includes the data about the alert
policy.
The webhook will be tested by sending the details to the api
and a status code and message is received and shown to the
user. Save changes button is added to the policy to save all
the changes made to the policy like the webhook profile id
and payload to customise it.
Fig-2 : Flowchart of alert notification system
6. DRAWBACKS OF ALERT NOTIFICATION SYSTEM
An alerting system is designed to transmit messages to a
large group of people as rapidly and feasible. But it does
come with its drawbacks. Some of them include -
Software glitches - Certain eventsmightbesodisastrousthat
all control systems collapse, rendering a warning scenario
useless.
Without maintaining personal information up to date - A
notification chain is as strong like its address book. When
you aren't capable of reaching the individuals you need to
reach, if you don't maintain email contact information
updated. It is impossible to contact them.
Costly - Certain emergency alert solutions in this industry
are significantly much costly over others. This might not be
rational decisions options based on the industry's revenue
and expenditure status.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2601
Indifference - If receiversweren'ttaughttocomprehend why
and how the warnings are really issued and the reason they
should get to respond, sometimes the personnel may not
hold them accountable adequately.
7. CONCLUSION AND FUTURE SCOPE
An alert notification system with thesupportofwebhooks is
proposed which is basedonsendingalertmessagestoclients
by using emails or webhooks.
To summarize publishing the Alert events to a Webhook
listener is a most preferred & adoptable way for these
enterprise customers to automate the flow from Incident
detection to closure. This project gives a user friendly
interface to the customers to interact with the system and
makes the work easier. This feature will let theusersendthe
alert body to the webhook profile selected. It also gives the
option for the user to customise their message by adding a
new field $format_alert_msg. It shows the responsefromthe
webhook on the interface.
The proposed system can include some features where
webhook profiles can be categorised accordingtothetype of
the alert policy. Webhooks can also be restricted to have all
the required data with correct information.
The save changes should work even if there is no
modification in the condition if there is a change in the
details of the webhook. Validation of the body needs to be
done to prevent incorrect messages.
A feature to minimise the alert noise and filter spam can be
added using machine learning models. Further
enhancements can include the auditing and reporting of the
issues and dynamic warnings can be sent to the client.
REFERENCES
[1] Arshad Javeed "Performance Optimization Techniques
for ReactJS," in 2019 IEEE International Conference on
Electrical, Computer and Communication Technologies
[2] Emir Ugljanin; Noura Faci; Mohamed Sellami; Zakaria
Maamar," in 2020 IEEE International Conference on
Enabling Technologies:
[3] Piotr Roksela; Marek Konieczny; Slawomir Zielinski,
"Evaluating execution strategies of GraphQL queries," in
43rd International Conference on Telecommunications and
Signal Processing (TSP) 2021
[4] Dong-cheol Jeon; LIUHAOYANG; Heejoung Hwang,
"Design of Hybrid Application Based on GraphQL for
Efficient Query for PHR“ in International Conference on
Information and Communication Technology Convergence
(ICTC) 2019
[5] Marjan Gusev; Sasko Ristov; Goran Velkoski; Pano
Gushev, “Alert notification as a service” in International
Convention on InformationandCommunicationTechnology,
Electronics and Microelectronics (MIPRO) 2020
[6] Zazilah Binti May; “Real-time alert system for home
surveillance”, in IEEE International Conference on Control
System, Computing and Engineering 2019.
[7] Marjan Gusev; Sasko Ristov; Goran Velkoski; Pano
Gushev, “Alert notification as a service”, in 43rd
International Convention on Information and
Communication Technology, Electronics and
Microelectronics (MIPRO) 2020.

More Related Content

Similar to Alert webhook integration

Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...IRJET Journal
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
IRJET- In-House File Tracking System
IRJET-  	  In-House File Tracking SystemIRJET-  	  In-House File Tracking System
IRJET- In-House File Tracking SystemIRJET Journal
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability ManagementIRJET Journal
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET Journal
 
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership ManagementIRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership ManagementIRJET Journal
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...IRJET Journal
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET Journal
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
IRJET- Machine Learning based Network Security
IRJET-  	  Machine Learning based Network SecurityIRJET-  	  Machine Learning based Network Security
IRJET- Machine Learning based Network SecurityIRJET Journal
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsIRJET Journal
 
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageIRJET Journal
 
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET Journal
 
Supply Chain Management with Eco System
Supply Chain Management with Eco SystemSupply Chain Management with Eco System
Supply Chain Management with Eco SystemIRJET Journal
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...rajender147
 
fault tolerance management in cloud computing
fault tolerance management in cloud computingfault tolerance management in cloud computing
fault tolerance management in cloud computingKruthikka Palraj
 

Similar to Alert webhook integration (20)

Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
IRJET- In-House File Tracking System
IRJET-  	  In-House File Tracking SystemIRJET-  	  In-House File Tracking System
IRJET- In-House File Tracking System
 
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability Management
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
 
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership ManagementIRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership Management
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
IRJET- Machine Learning based Network Security
IRJET-  	  Machine Learning based Network SecurityIRJET-  	  Machine Learning based Network Security
IRJET- Machine Learning based Network Security
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web Applications
 
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud Storage
 
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
 
Supply Chain Management with Eco System
Supply Chain Management with Eco SystemSupply Chain Management with Eco System
Supply Chain Management with Eco System
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
 
fault tolerance management in cloud computing
fault tolerance management in cloud computingfault tolerance management in cloud computing
fault tolerance management in cloud computing
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 

Recently uploaded (20)

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 

Alert webhook integration

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2598 Webhook Support for Alert Policies 1 K Anjani Vaibhavi, 2 Anala M R 1,2 Department of Information Science and Engineering, R V College of Engineering, Bangalore, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Corporate employees havenumerousduties, and yet no matter how many activities they must complete on a daily basis, confidentiality and reliability is usually alwaysthe top priority. Assurance that one's system and its assets are secure from public and cybersecurity hazards is essential in the business world — and as a result, the capacity to offer real-time notifications to customers may seriously affect any firm. One must act quickly to halt a continuing event before it causes permanent damage to your networks and resources. Alerts are a medium of communication between a system and its user. Alerting allows individuals to stay up to date on the information that is important to them. An alert system that is efficient, secure, and dependablelowersthecostofexchanging goods and services. Key Words: Webhook, alerts, Reactjs, graphql, webhook testing 1.INTRODUCTION In the field of cyber security, alert notifications are amongst the most significant data resources. These alert andtell your Technology staff regarding the current hacking attacks, suspicious activities, and every other issue that may endanger your firm and which is why alerts are vital for the firm's safety. Alert system contains notifications that notify customers of critical security issues or dangers to one's device or intranet. It is critical for a company's security personnel to intervene swiftly in numerous security situations and manage any dangers while these pose major difficulties. 1.1 Alert Notification Systems Alerts are messages that warnyouofseveresecurity concerns or risks to any device or software. It is critical for the IT personnel to respond promptly in different security related events and control any dangers before they trigger major difficulties. An alert notification service's principal role or goal is to swiftly warn personnel of possible dangers or exceptional circumstances and to offer guidance about how to react to such concerns. It is essentialthatanyfirmshouldfollowthese alerts or concerns and warn the customers to achieve a reliable and safe network and devices. 1.2 Webhooks Webhooks are notifications that are sentautomaticallyby applications when any problem occurs. They contain content, or payload, and are delivered to a custom Domain, which is effectively the app's contact information or email. Webhooks are usually quicker and involve minimal effort on the user side. Applications and organizations can use webhooks to transmit automatic messages and data to different services. These are an effective way for any system to communicate with one another and be automatically alerted when anything important occurs. Webhooks allow users to send content through one application to another seamlessly. The objective behind this work is to integrate the alert notifications with webhooks for the user to automatically receive messages in case of any issues or security breaches and the benefits of the following integration. A method to integrate the alert notification system and the webhooks is shown 2. RELATED WORKS The subject of alert notifications and webhooks is a modern way of warning the users about the critical issues. In this section, several relevant and well-known papers are studied to understand what the present systems offer and how they operate. The author of [1] describes several effective techniques for addressingsimilar issues insidethe project,henceimproving the efficiency of the ReactJS App in a chain of processes. It also presents a time-efficient research approach for finding items in a huge data collection. In [2] the authors paper provided a method for monitoring the implementation of communal acts on Fb as well as the performanceofcorporate duties. Combining activities like posting and commenting progress in the developmentofsocialstreams.Webhooksare used to "watch" to updates that occur on Facebook profiles. Various GraphQL query processing algorithms are assessed and their efficacy was evaluated while handling only with N+1 issue in [3]. [4] explains a modular approach which could present customers' PHR quickly combining GraphQL and React Native, and therefore how utilising graphql in a clinical diagnostics may enable api calls faster, simpler, and more economic. The authors introduce in [5], how an
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2599 artificially intelligent agent may do this work rather than people directly accessing the internet and provide data as if the webpage had deployed an useability. They discussed the specifics and merits of this structure. In [6], the author suggested amethodhasavoidedtheneedof costly monitoring devices as feed and alert system ways. It has been able to discern movements and snap photos, and also send Alert messages through GSM along with e-mail notifications linked to the picture or file. In[7], the authors discussedabouthowthealertnotificationservicebenefitsthe users or clients in getting the required information from the services. The proposed alert notification system integrates alert policies by sending warning messages by following methods like emails or webhooks. 3. BENEFITS OF ALERT NOTIFICATION SYSTEM A. Customizable messages Webhooks are integrated with a payload which allows the user to customize the contentofthenotificationthatissentto the domain address. This lets the user to send the appropriate message according to the alert policy and type. B. Computerized Alerting and responses If a problem is ignored, the warning system immediately alerts the appropriate staff members or selected people based on a specified on-call schedule or the stated webhook, and escalates to higher standards of protection. C. Simple Incorporation Because modern IT infrastructures are so complicated, it's critical to choose a service that is simple to self-serve and interact with. This furthermore enhances the ROI of existing and emerging IT expenditures by allowing information to be shared more effectively between platforms and remote personnel. D. Monitoring and Accounting Alert and issue monitoring, auditing, and monitoring are critical tools for assisting groups in determining from which one can improve performance and effectiveness by optimizingresponseprocedures,fine-tuningincidenttriggers and notifying, and perhaps more. E. High Availability and Reliability Since dependable monitoring is so vital, it's essential to engage in a platform that has organization structural resilience or scalability to avoid exposing the organizationto hazards. An alerting system should be available and comply with tight Service level agreements, thus it is critical to choose a provider that is open around its backup and does not have planned service periods. 4. METHODOLOGY An alert notification system should inform on all sorts of warningsand issues that happened inone'ssystemrelatedto unit procurement, setup, and data access. Consumers get the choice of sending an email to the relevant team personnel or using Webhooks as a transportation mechanism whenever these prompts occur when establishing these Alerts & Occurrences. This may be incredibly valuable for developing efficient event-driven processes, interactingwithsomeother 3rd party apps, or troubleshooting the systems and intranet. In the proposed system the alert notificationsystemcontains different alertpolicies.Eachalertpolicycanbecategorizedby their type and is integrated with two options - a) Sending email to admins or appropriate team personnel b) Notifying via webhooks. These alert policieshelptheuserstoknowany critical issues occured. Fig 1 shows the basic architecture of the alert notification system. Fig-1 : Architecture of alert notification system a) Webhook Structure Each webhook is associated with aurlandapayload.Payload contains the information about it. In general it can contain wbhook_body, webhook_id, webhook_headers and other information describing the webhook. b) Email Administrators / Personnel An email can be sent to the required or selected administrators/ personnel using customised HTML emails when an alert is triggered. c) Using Webhooks Whenever a Warning is set tosend as a Webhooknotification to the client, the notification is sent as a JSON formatted text usinga POST request. The returned object has multiplefields , that JSON object provides data on the policy involved, the severity of the warning, and other facts and attributes.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2600 d) Test the webhook profile On clicking the test button after selecting the webhook, the ‘text’ part of the body entered is sent to the platform chosen as a notification/message. e) Save Changes After the entire process, the user is given an option of saving the changes he made, on clicking this, the changes are made and saved into the api. Thesechangesreflectwhenthepageis again opened for further use. f) Alert policy fields Every alert policy can contain a special field like webhook_profile_idandwebhook_profile_payloadintegrated with the certain alert policy. Every time an alert occurs the warning is sent to that particular webhook url using the webhook_id associated with it and alsopayloadwithitissent as the body of the content. This alert policy can be modified to select a particular webhook from the available ones and the content can be changed and saved. Integration of ReactJS,graphQLandnodeJSmakesthesystem more efficient. GraphQl can make queries to only get the required information from the api, rather than everything. Figure 2 shows the flowchart of an alert notification system. 5. RESULTS AND ANALYSIS The alert notification system provides an easy and efficient to communicate with clients or personnel regarding critical issues in the system. The options of notify webhook and email admin(s)/notify webhook can be added to the alert policy. The available webhook profiles are listed in a dropdown for the user to select and also an option to create a new profile can be given. The selected webhook profile displays the details of it such as method, url, headers and body. The webhook body is made editable for user to send the required payload and validate it. A new field $format_alert_msg can be added to the webhook to get the customized payload which includes the data about the alert policy. The webhook will be tested by sending the details to the api and a status code and message is received and shown to the user. Save changes button is added to the policy to save all the changes made to the policy like the webhook profile id and payload to customise it. Fig-2 : Flowchart of alert notification system 6. DRAWBACKS OF ALERT NOTIFICATION SYSTEM An alerting system is designed to transmit messages to a large group of people as rapidly and feasible. But it does come with its drawbacks. Some of them include - Software glitches - Certain eventsmightbesodisastrousthat all control systems collapse, rendering a warning scenario useless. Without maintaining personal information up to date - A notification chain is as strong like its address book. When you aren't capable of reaching the individuals you need to reach, if you don't maintain email contact information updated. It is impossible to contact them. Costly - Certain emergency alert solutions in this industry are significantly much costly over others. This might not be rational decisions options based on the industry's revenue and expenditure status.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2601 Indifference - If receiversweren'ttaughttocomprehend why and how the warnings are really issued and the reason they should get to respond, sometimes the personnel may not hold them accountable adequately. 7. CONCLUSION AND FUTURE SCOPE An alert notification system with thesupportofwebhooks is proposed which is basedonsendingalertmessagestoclients by using emails or webhooks. To summarize publishing the Alert events to a Webhook listener is a most preferred & adoptable way for these enterprise customers to automate the flow from Incident detection to closure. This project gives a user friendly interface to the customers to interact with the system and makes the work easier. This feature will let theusersendthe alert body to the webhook profile selected. It also gives the option for the user to customise their message by adding a new field $format_alert_msg. It shows the responsefromthe webhook on the interface. The proposed system can include some features where webhook profiles can be categorised accordingtothetype of the alert policy. Webhooks can also be restricted to have all the required data with correct information. The save changes should work even if there is no modification in the condition if there is a change in the details of the webhook. Validation of the body needs to be done to prevent incorrect messages. A feature to minimise the alert noise and filter spam can be added using machine learning models. Further enhancements can include the auditing and reporting of the issues and dynamic warnings can be sent to the client. REFERENCES [1] Arshad Javeed "Performance Optimization Techniques for ReactJS," in 2019 IEEE International Conference on Electrical, Computer and Communication Technologies [2] Emir Ugljanin; Noura Faci; Mohamed Sellami; Zakaria Maamar," in 2020 IEEE International Conference on Enabling Technologies: [3] Piotr Roksela; Marek Konieczny; Slawomir Zielinski, "Evaluating execution strategies of GraphQL queries," in 43rd International Conference on Telecommunications and Signal Processing (TSP) 2021 [4] Dong-cheol Jeon; LIUHAOYANG; Heejoung Hwang, "Design of Hybrid Application Based on GraphQL for Efficient Query for PHR“ in International Conference on Information and Communication Technology Convergence (ICTC) 2019 [5] Marjan Gusev; Sasko Ristov; Goran Velkoski; Pano Gushev, “Alert notification as a service” in International Convention on InformationandCommunicationTechnology, Electronics and Microelectronics (MIPRO) 2020 [6] Zazilah Binti May; “Real-time alert system for home surveillance”, in IEEE International Conference on Control System, Computing and Engineering 2019. [7] Marjan Gusev; Sasko Ristov; Goran Velkoski; Pano Gushev, “Alert notification as a service”, in 43rd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) 2020.