SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 685
3 JUNCTURE BASED ISSUER DRIVEN PULL OUT SYSTEM USING
DISTRIBUTED SERVERS
M.V.S.L TEJASRI1, Mr. R. KANNAN 2
1Student, Department of Computer science and Engineering, Gojan School of Business and Technology,
Redhills, Chennai
2Assistant professor, Department of Computer science and Engineering, Gojan School of Business and Technology,
Redhills, Chennai
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Network level Security visualization is considered
to be one of the foremost area where most of the exploration is
going on in visualizing the network nature for the systems.
Due to vulnerability attacks and projection matrix
manipulation, many investigators are directed towards
security monitoring measures and preventive techniques
against intrusions. There are many major procedures and
technological jargons dominating the securityrelatedstuffs in
the it industry. Many companies are focusing towards
projecting their monitoring products in this evolving field.
User accessed information such as number packet read and
write, Input output response time and delay time were not
tracked down. Visualizes all server status and security events
with client interaction. Ibmtivoli, spiceworks, xymon,
intermapper are some of the major tools available in the
market. Most of the tools picturizeby monitoringcertain items
in the network/server. Network Trace and system activitycan
be Visualization and security events from the server and the
interaction with the client were visualized in the module and
also User contexts information were visualized. In our project,
our focused areas include host/server monitoring, internal
and external monitoring, port activity and attack patterns
Network tomography is an important area of network
measurement, which deals with monitoring the health of
various links in a network using end-to-end probes sent by
agents located at vantage points in the network/internet.
KeyWords: Visualization, host/server monitoring,
internal and external monitoring, port activity and
attack pattern
1. INTRODUCTION
Although the visualization of network security events is the
subject of this survey, this paper does not focusondesigning
and developing a specific visualization system. Instead, we
consider network security with respect to information
visualization and introducea collectionofusecaseclasses.In
this study, we provide an overview of the increasing
relevance of security visualization. We explore a novel
classification approach and review the artifacts most
commonly associated with security visualization systems.
We provide a historical context for this emerging practice
and outline its surrounding concerns whileprovidingdesign
guidelines for future developments. Visual data analysis
helps to perceive patterns,trends,structures,andexceptions
in even the most complex data sources.
As the quantity of network audit traces produced each day
grows exponentially, communicating with visuals allowsfor
comprehension of these large quantities of data.
Visualization allows the audience to identify concepts and
relationships that they had not previouslyrealized.Thereby,
explicitly revealing properties and relationships inherent
and implicit in the underlying data.
Identifying patterns and anomalies enlightens the user,
provides new knowledge and insight, and provokes further
explorations. It is thesefascinatingcapabilitiesthatinfluence
the use of information visualization for network security.
Visualization is not only efficient but also very effective at
communicating information. A single graph or picture can
potentially summarize a month’s worth of intrusion alerts
(depending on the typeofnetwork),possiblyshowingtrends
and exceptions, as opposed to scrolling through multiple
pages of raw audit data with little sense of the underlying
events. Security Visualization is a very young term. It
expresses the idea that common visualization techniques
have been designed for use cases that are not supportive of
security-related data, demanding novel techniques fine-
tuned for the purpose of thorough analysis. It may not
always be possible to fully predict how an end user will
perceive and interpret a design due to the varying nature of
the audience’s cognitive characteristics. Yet careful
consideration of the user’s needs, cognitive skills, and
abilities can determine the appropriate content and design.
Often associated with human-computer interaction, the
philosophy of user-centered design places the end user at
the center of the design process. Network securityisa highly
specialized and technical discipline and operation. It deals
with packets and flows, intrusion detection and prevention
systems, vulnerabilities, exploits, malware, honeypots, and
risk0 management and threat mitigation. The complex,
dynamic, and interdependent nature of network security
demands extensive research during the development
process. Without an in-depth understanding of security
operations and extensive hands on experience, developinga
security visualization system will not be possible.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 686
A design process centered on the needs, behaviors, and
expectations of security analysts can greatly influence and
impact the usability and practicality of such systems. For
best results, security experts and visual designers must
thereby collaborate to complement each other’s skills and
expertise to innovate informative, interactive, and
exploratory systems that are technically accurate and
aesthetically pleasing. In this survey, we begin by looking
into different categories of data sources incorporated in the
design of security visualizations and provide an informative
list of sources accessible to the research community. By
expressing our main contribution in the classification of
network security visualization systems. We provide a
detailed descriptionoftheproposedtaxonomytogetherwith
an analysis of the derived use-case classes. We follow by
giving a thorough description of each system as we outline
its strengths and weaknesses. An overall assessment of
systems in each use-case class in addition to guidelines and
directions for future 23systems is also provided. We
summarize the multiple attributes of recent network
security visualization systems in a table for better future
references. By outlining issues and concerns surrounding
security visualization by elaborating on seven potential
pitfalls. By summarizing our findings. Papers studied in this
survey were selected based on the following metrics
1.1 Relevance to network security
As the title of the paper indicates, this study focuses
specifically on network security visualization systems.
Visualizations of code security, binary files, or visual
cryptanalysis are subjects that couldspananothervolumeof
similar size and are thereby not considered in this study.
Contribution of system and visual techniques: Due to the
chronological study of papers, systems that have utilized a
specific visualization technique or method with highly
similar characteristics to those of previous systemshavenot
been selected for thissurvey. Similarly,visualizationsystems
that lack contextual,perceptive,andcognitiveconsiderations
are also not considered.
1.2 Satisfactoriness of evaluation
Although most systems surveyed in this paper lack formal
evaluation yet many have been validated through ad hoc
usecase attack scenarios. Systems that lack even this basic
validation strategy are also notconsideredinthissurvey. We
believe these three metrics impact the quantity and quality
of papers surveyed in this work toresemblesystemsthatare
focused explicitly on network security, are novel in their
incorporated visual techniques, and are validated onatleast
a use-case scenario. Systems that do not adhere to these
metrics are thereby not considered in this study.
2. EXISTING SYSTEM
In the existing system, we are focusing on the major
technical perceptions for our network visualization areas.
Connectivity with the host and server will be monitoring for
any downfall time. Utilization of the system – details about
the host vs server utilization.Number of accessible users -
Calculating the individual and concurrent users on the
system.LoggingPacket Traces – tracing the packets
traversing between the systems.Serverlogs – monitoringthe
security, application logs in the server. Port Activityservervs
host interactions – monitor the port and protocol used in
communication level of activity through the portIntrusion
detectionintrusion alerts – alertscreate bythedevelopers on
anonymous activities.dns traces – recording anonymous
entries in the domain.
3. RELATED WORKS
Towards Insider Threat Detection using Web Server Logs.
Malicious insiders represent one of the most difficult
categories of threats an organization must consider when
mitigating operational risk. Insiders by definition possess
elevatedprivileges;haveknowledgeaboutcontrol measures;
and may be able to bypass security measures designed to
prevent, detect, or react to unauthorized access. In this
paper, we discuss our initial research efforts focused on the
detection of malicious insiders who exploit internal
organizational web servers. The objective of the research is
to apply lessons learnedin network monitoringdomains and
enterprise log management to investigate various
approaches for detecting insider threat activities using
standardized tools and a common event expression
framework[1]
Continuous Privacy Preserving Publishing of Data Streams.
Recently, privacy preserving data publishing has received a
lot of attention in both research and applications.Mostofthe
previous studies, however, focus on static data sets. In this
paper, we study an emerging problem of continuousprivacy
preserving publishing of data streams which cannot be
solved by any straightforward extensions of the existing
privacy preserving publishing methods on static data. To
tackle the problem, we develop a novel approach which
considers both the distribution of the data entries to be
published and the statistical distribution of the data stream.
An extensive performance study using both real data sets
and synthetic data sets varies the effectiveness and the
efficiency of our methods[2]
A Document Model Management framework based on core
components his paper implements a document model
management framework, based on core components. This
framework is built on an open source basis and may cope
with interoperability problems providing transformation
and schema generation components[3]
A Content Driven Access Control System
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 687
Protecting identity in the Internet age requires the ability to
go beyond the identification of explicitly identifying
information like social security numbers, to also find the
broadly held attributes that, when taken together, are
identifying. We present a system that can work in
conjunctionwithnatural languagepro9cessingalgorithmsor
user-generated tags, to protect identifying attributes in text.
The system uses a new attribute-based encryption protocol
to control access to such identifying attributes and thus
protects identity. The system supports the dentition of user
access rights based on role or identity. Our system encrypts
not only sensitive personal information, but also groups of
personal attributes which may indirectly allow for the
inference of a person’s identity, even though none of the
attributes is directly sensitive. Personal attributes are
encrypted withanattribute-basedencryptionscheme,which
allows for efficient, fine-grained access control based on the
content of documents
4. PROPOSED SYSTEM
In the existingsystem,they’veproposedvarioustechniques
in visualizing the network data. But unfortunately, they
couldn’t identify or specify the implication of the major
disaster or network flaw in a system. In our proposed
approach, we provide the detailed visualize of the network
information as mentioned below.NumberofTOTAL PACKET
READS ,Latest packets read in a specific interval Number of
TOTAL WRITES ON THE PACKETS, Latest packets write in a
specific interval, Complete Input/output busy time,
Complete CPU busy schedule, CompleteInput/outputReads,
Latest number of seconds Input / Output reads Number of
process info reported errors Number of spid’s reported
error in the server, Authentication information's, Disabled
services in the server In our system, we are trying to project
the detailed view of how the problem occurred and possible
solution for the servers.Intrusionrelatedinformation'swere
considered and precautionary measures towardsintrusions
will be addressed in our future work.
5. SYSTEM DESIGN FOR DISTRIBUTION OF DATA
6. SYSTEM IMPLEMENTATION
 Initial Virtual Machine Information Module:
 Virtual Machine Disk Space Details Module:
 Server Level Information Module:
 Network Path Tracing Module (Server level data info
module):
 Read/Write Status Module:
 Application Log Events Visualization Module:
 User Contexts Visualization Module
7. MODULE DESCRIPTION
7.1 Initial Virtual Machine Information Module:
The Initial Virtual Machine Information Module defines the
network and traces the initial; machine information using
the algorithm Data Stream Model and the k-ary Sketch
Algorithm which is generable from a network, and produces
a network N such that is generable from N and not from any
other network.
Machine Name will bedefined.ServerName(instanceName)
will be noted. Edition Installed will be updated. Product
Build Information Level info will be shown.
SP Level & Collation Type will be fixed
Last Query/Server usage will be monitored
Number of Cup's Used is notified
Hyper Thread OS Level will be well-defined
Memory(MB) will be observed.
Virtual Memory(MB) will be shown.
MAX Worker Count will be acquainted
OD Priority Class will be noted. Scheduler Count will be
traced.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 688
7.2 Virtual Machine Disk Space Details Module:
The Disk Space Details modules define the “Virtual Disk
Space Details information” such as Drive info details
(C:/DRIVE, E: DRIVE), Also the memory/Free space
allocation in Megabyte(MB) will be observed.
7.3 Server Level Information Module
The Server level information module tends to define The
Number of packets Received/Send Status will be notified.
Along with that the Graphical Representation of the server
level status information will be notified and shown in the
graphical illustration. The network packets info will also be
defined in this module by indicating the packer revived
status, Packets sent status & the Error packets status.
7.4 Network Path Tracing Module (Server level data
info module)
Path tracing is a graphical method of rendering
traces of the data navigation happening in the network such
that the global illumination is faithful to reality.
This algorithm is integrating over all accumulation of data
arriving to a single point on the surface of an object. This
accumulation is then reduced by an into sub paths based on
the different access points in different intervals. Following
items were visualized under this module: Number ofTOTAL
PACKET READS (In terms of bytes) since the last server was
started Latest packets read in a specific interval (Data read
in bytes) Number OF TOTAL WRITES ON THE PACKETS (In
terms of bytes) since the last server starts Latest packets
write in a specific interval (Data read in bytes)connection
estabilished.
7.5 Read/Write Status Module
Security events from the server and the interaction with the
client were visualized in the module:
Detailed analytical values of a login have been added or
removed as a database user to a database.
Detailed analytical values of a login were added or removed
from a fixed server role.
Detailed analytical values of a login have been added to or
removed from a role. Detailed analytical valuesofa database
role were added to or removed from a database. Detailed
analytical values of a login have been added or removed.
Detailed analytical values of a password have been changed
for an application role. Detailed analytical valuesofa backup
or restore statement has been issued. Reports audit
messages related to Service Broker dialog security.
Reports audit messages related to Service Broker transport
security. Indicates that an audit trace modification has been
made. Indicates that the permissions to change the ownerof
a database have been checked.
7.6 Application and Log Events Visualization Module
Security events from the server and the interaction with the
client were visualized in the module: Successful trusted
logins, successful non-trusted logins, failed user logins.
7.7 USER CONTEXTS Visualization Module
User contexts information were visualized in the module,
Identity management indicates the management of
individual identifiers, their authentication, authorization
privileges/permissions within or across system and
enterprise boundaries with the goal of increasing security
and productivity. Identity management systems, products,
applications, and platforms are commercial Identity
management solutions implemented for enterprises and
organizations. Technologies, services, and terms related to
Identity management include Active Directory, Service
Providers, Identity Providers, Web Services, Access control,
Digital Identities, Password Managers, Single Sign-on,
Security Tokens, Security Token Services.
8. SCREEN SHOTS
HOMEPAGE
SERVER DETAILS EXTRACTION
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 689
NUMBER OF PACKETS RECIEVED/SEND STATUS
LAST EXECUTION REQUEST ON SERVER
READS/WRITES
LATENCY AND BYTES TRANSFER INFO WITH
VIRTUALIZED SERVER
USER LOG EVENT TRACING
USER CONTEXT VALUE
9. CONCLUSION
As the number of security related events generated in
modern networks is on the rise, the need for network
security visualization systems is felt more than ever. In this
paper, we have examined recent works in network security
visualization from a use-case perspective. Five use-case
classes, each representing a different application area, were
defined and several recent works in each category were
thoroughly described. We detailed the underlying data
sources of network security visualization and gave a few
examples of each category. Analysis of these systems
motivated us to examine several issues and concerns
surrounding this emerging field. We elaborated on the
advantages and shortcomings of all use-case classes and
shed light on paths thatresearchersshouldfocustoward. We
aggregated the findings ofourwork intoaninformativetable
for future references. While the field of visualization is as
wide as imagination allows, we hope that the analysis and
taxonomy presented here will motivatebetterfuture work in
this area.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 690
FUTURE ENHANCEMENTS
In future work, field. We elaborated on the advantages and
shortcomings of all use-case classes and shed light on paths
that researchers should focus toward. We aggregated the
findings of our work into an informative table for future
references. While the field of visualization wide.
REFERENCES
[1] C. Ware, Information Visualization: Perception for
Design. Morgan
Kaufmann Publishers, Inc., 2004.
[2] G. Conti, Security Data Visualization. No Starch Press,
2007.
[3] R. Marty, Applied Security Visualization. Addison-
WesleProfessional, 2008.
[4] R. Erbacher, K. Walker, and D. Frincke, “Intrusion and
Misuse Detection in Large-Scale Systems,” IEEE Computer
Graphics and Applications, vol. 22, no. 1, pp. 38-48, Jan./Feb.
2002.
[5] R. Erbacher, “Intrusion Behavior Detection through
Visualization,” Proc. IEEE Int’l Conf. Systems, Man and
Cybernetics, pp. 2507- 2513, 2003.
[6] T. Takada and H. Koike, “Tudumi: Information
Visualization System for Monitoring and AuditingComputer
Logs,” Proc. Sixth Int’l Conf. Information Visualization, pp.
570-576, 2002.
[7] K. Lakkaraju, W. Yurcik, and A. Lee, “NVisionIP: Netflow
Visualizations of System State for Security Situational
Awareness,” Proc. ACM Workshop Visualization and Data
Mining forComputer Security, vol. 29, pp. 65-72, 2004.

More Related Content

What's hot

Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios
ijcsa
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET Journal
 
J1802056063
J1802056063J1802056063
J1802056063
IOSR Journals
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Editor IJCATR
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
AM Publications
 
E1802052327
E1802052327E1802052327
E1802052327
IOSR Journals
 
A Study of Database Protection Techniques
A Study of Database Protection TechniquesA Study of Database Protection Techniques
A Study of Database Protection Techniques
IJSRED
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Network
ijircee
 
Software reusabilitydevelopment through NFL approach For identifying security...
Software reusabilitydevelopment through NFL approach For identifying security...Software reusabilitydevelopment through NFL approach For identifying security...
Software reusabilitydevelopment through NFL approach For identifying security...
IJECEIAES
 
Top Cited Paper - The International Journal of Network Security & Its Applica...
Top Cited Paper - The International Journal of Network Security & Its Applica...Top Cited Paper - The International Journal of Network Security & Its Applica...
Top Cited Paper - The International Journal of Network Security & Its Applica...
IJNSA Journal
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
IJNSA Journal
 
An Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLANAn Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLAN
rahulmonikasharma
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
IRJET Journal
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
IJNSA Journal
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IJNSA Journal
 
A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...
redpel dot com
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
IJNSA Journal
 

What's hot (17)

Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
J1802056063
J1802056063J1802056063
J1802056063
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
 
E1802052327
E1802052327E1802052327
E1802052327
 
A Study of Database Protection Techniques
A Study of Database Protection TechniquesA Study of Database Protection Techniques
A Study of Database Protection Techniques
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Network
 
Software reusabilitydevelopment through NFL approach For identifying security...
Software reusabilitydevelopment through NFL approach For identifying security...Software reusabilitydevelopment through NFL approach For identifying security...
Software reusabilitydevelopment through NFL approach For identifying security...
 
Top Cited Paper - The International Journal of Network Security & Its Applica...
Top Cited Paper - The International Journal of Network Security & Its Applica...Top Cited Paper - The International Journal of Network Security & Its Applica...
Top Cited Paper - The International Journal of Network Security & Its Applica...
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
 
An Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLANAn Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLAN
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
 
A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
 

Similar to IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers

A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKA PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
IRJET Journal
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability Management
IRJET Journal
 
A05510105
A05510105A05510105
A05510105
IOSR-JEN
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
IRJET Journal
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
guesta67d4a
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET Journal
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
IRJET Journal
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique
IRJET Journal
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessDavid Sweigert
 
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET Journal
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
Gyan Prakash
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET Journal
 
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET Journal
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
IJNSA Journal
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET Journal
 
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding SchemesIRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET Journal
 
IRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart Grid
IRJET Journal
 
Titles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdfTitles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdf
info751436
 
Secure final
Secure finalSecure final
Secure final
Vinoth Barithi
 

Similar to IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers (20)

A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKA PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability Management
 
A05510105
A05510105A05510105
A05510105
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
 
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial Intelligence
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
 
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding SchemesIRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
 
IRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart Grid
 
Titles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdfTitles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdf
 
Secure final
Secure finalSecure final
Secure final
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 

Recently uploaded (20)

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 

IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 685 3 JUNCTURE BASED ISSUER DRIVEN PULL OUT SYSTEM USING DISTRIBUTED SERVERS M.V.S.L TEJASRI1, Mr. R. KANNAN 2 1Student, Department of Computer science and Engineering, Gojan School of Business and Technology, Redhills, Chennai 2Assistant professor, Department of Computer science and Engineering, Gojan School of Business and Technology, Redhills, Chennai ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Network level Security visualization is considered to be one of the foremost area where most of the exploration is going on in visualizing the network nature for the systems. Due to vulnerability attacks and projection matrix manipulation, many investigators are directed towards security monitoring measures and preventive techniques against intrusions. There are many major procedures and technological jargons dominating the securityrelatedstuffs in the it industry. Many companies are focusing towards projecting their monitoring products in this evolving field. User accessed information such as number packet read and write, Input output response time and delay time were not tracked down. Visualizes all server status and security events with client interaction. Ibmtivoli, spiceworks, xymon, intermapper are some of the major tools available in the market. Most of the tools picturizeby monitoringcertain items in the network/server. Network Trace and system activitycan be Visualization and security events from the server and the interaction with the client were visualized in the module and also User contexts information were visualized. In our project, our focused areas include host/server monitoring, internal and external monitoring, port activity and attack patterns Network tomography is an important area of network measurement, which deals with monitoring the health of various links in a network using end-to-end probes sent by agents located at vantage points in the network/internet. KeyWords: Visualization, host/server monitoring, internal and external monitoring, port activity and attack pattern 1. INTRODUCTION Although the visualization of network security events is the subject of this survey, this paper does not focusondesigning and developing a specific visualization system. Instead, we consider network security with respect to information visualization and introducea collectionofusecaseclasses.In this study, we provide an overview of the increasing relevance of security visualization. We explore a novel classification approach and review the artifacts most commonly associated with security visualization systems. We provide a historical context for this emerging practice and outline its surrounding concerns whileprovidingdesign guidelines for future developments. Visual data analysis helps to perceive patterns,trends,structures,andexceptions in even the most complex data sources. As the quantity of network audit traces produced each day grows exponentially, communicating with visuals allowsfor comprehension of these large quantities of data. Visualization allows the audience to identify concepts and relationships that they had not previouslyrealized.Thereby, explicitly revealing properties and relationships inherent and implicit in the underlying data. Identifying patterns and anomalies enlightens the user, provides new knowledge and insight, and provokes further explorations. It is thesefascinatingcapabilitiesthatinfluence the use of information visualization for network security. Visualization is not only efficient but also very effective at communicating information. A single graph or picture can potentially summarize a month’s worth of intrusion alerts (depending on the typeofnetwork),possiblyshowingtrends and exceptions, as opposed to scrolling through multiple pages of raw audit data with little sense of the underlying events. Security Visualization is a very young term. It expresses the idea that common visualization techniques have been designed for use cases that are not supportive of security-related data, demanding novel techniques fine- tuned for the purpose of thorough analysis. It may not always be possible to fully predict how an end user will perceive and interpret a design due to the varying nature of the audience’s cognitive characteristics. Yet careful consideration of the user’s needs, cognitive skills, and abilities can determine the appropriate content and design. Often associated with human-computer interaction, the philosophy of user-centered design places the end user at the center of the design process. Network securityisa highly specialized and technical discipline and operation. It deals with packets and flows, intrusion detection and prevention systems, vulnerabilities, exploits, malware, honeypots, and risk0 management and threat mitigation. The complex, dynamic, and interdependent nature of network security demands extensive research during the development process. Without an in-depth understanding of security operations and extensive hands on experience, developinga security visualization system will not be possible.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 686 A design process centered on the needs, behaviors, and expectations of security analysts can greatly influence and impact the usability and practicality of such systems. For best results, security experts and visual designers must thereby collaborate to complement each other’s skills and expertise to innovate informative, interactive, and exploratory systems that are technically accurate and aesthetically pleasing. In this survey, we begin by looking into different categories of data sources incorporated in the design of security visualizations and provide an informative list of sources accessible to the research community. By expressing our main contribution in the classification of network security visualization systems. We provide a detailed descriptionoftheproposedtaxonomytogetherwith an analysis of the derived use-case classes. We follow by giving a thorough description of each system as we outline its strengths and weaknesses. An overall assessment of systems in each use-case class in addition to guidelines and directions for future 23systems is also provided. We summarize the multiple attributes of recent network security visualization systems in a table for better future references. By outlining issues and concerns surrounding security visualization by elaborating on seven potential pitfalls. By summarizing our findings. Papers studied in this survey were selected based on the following metrics 1.1 Relevance to network security As the title of the paper indicates, this study focuses specifically on network security visualization systems. Visualizations of code security, binary files, or visual cryptanalysis are subjects that couldspananothervolumeof similar size and are thereby not considered in this study. Contribution of system and visual techniques: Due to the chronological study of papers, systems that have utilized a specific visualization technique or method with highly similar characteristics to those of previous systemshavenot been selected for thissurvey. Similarly,visualizationsystems that lack contextual,perceptive,andcognitiveconsiderations are also not considered. 1.2 Satisfactoriness of evaluation Although most systems surveyed in this paper lack formal evaluation yet many have been validated through ad hoc usecase attack scenarios. Systems that lack even this basic validation strategy are also notconsideredinthissurvey. We believe these three metrics impact the quantity and quality of papers surveyed in this work toresemblesystemsthatare focused explicitly on network security, are novel in their incorporated visual techniques, and are validated onatleast a use-case scenario. Systems that do not adhere to these metrics are thereby not considered in this study. 2. EXISTING SYSTEM In the existing system, we are focusing on the major technical perceptions for our network visualization areas. Connectivity with the host and server will be monitoring for any downfall time. Utilization of the system – details about the host vs server utilization.Number of accessible users - Calculating the individual and concurrent users on the system.LoggingPacket Traces – tracing the packets traversing between the systems.Serverlogs – monitoringthe security, application logs in the server. Port Activityservervs host interactions – monitor the port and protocol used in communication level of activity through the portIntrusion detectionintrusion alerts – alertscreate bythedevelopers on anonymous activities.dns traces – recording anonymous entries in the domain. 3. RELATED WORKS Towards Insider Threat Detection using Web Server Logs. Malicious insiders represent one of the most difficult categories of threats an organization must consider when mitigating operational risk. Insiders by definition possess elevatedprivileges;haveknowledgeaboutcontrol measures; and may be able to bypass security measures designed to prevent, detect, or react to unauthorized access. In this paper, we discuss our initial research efforts focused on the detection of malicious insiders who exploit internal organizational web servers. The objective of the research is to apply lessons learnedin network monitoringdomains and enterprise log management to investigate various approaches for detecting insider threat activities using standardized tools and a common event expression framework[1] Continuous Privacy Preserving Publishing of Data Streams. Recently, privacy preserving data publishing has received a lot of attention in both research and applications.Mostofthe previous studies, however, focus on static data sets. In this paper, we study an emerging problem of continuousprivacy preserving publishing of data streams which cannot be solved by any straightforward extensions of the existing privacy preserving publishing methods on static data. To tackle the problem, we develop a novel approach which considers both the distribution of the data entries to be published and the statistical distribution of the data stream. An extensive performance study using both real data sets and synthetic data sets varies the effectiveness and the efficiency of our methods[2] A Document Model Management framework based on core components his paper implements a document model management framework, based on core components. This framework is built on an open source basis and may cope with interoperability problems providing transformation and schema generation components[3] A Content Driven Access Control System
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 687 Protecting identity in the Internet age requires the ability to go beyond the identification of explicitly identifying information like social security numbers, to also find the broadly held attributes that, when taken together, are identifying. We present a system that can work in conjunctionwithnatural languagepro9cessingalgorithmsor user-generated tags, to protect identifying attributes in text. The system uses a new attribute-based encryption protocol to control access to such identifying attributes and thus protects identity. The system supports the dentition of user access rights based on role or identity. Our system encrypts not only sensitive personal information, but also groups of personal attributes which may indirectly allow for the inference of a person’s identity, even though none of the attributes is directly sensitive. Personal attributes are encrypted withanattribute-basedencryptionscheme,which allows for efficient, fine-grained access control based on the content of documents 4. PROPOSED SYSTEM In the existingsystem,they’veproposedvarioustechniques in visualizing the network data. But unfortunately, they couldn’t identify or specify the implication of the major disaster or network flaw in a system. In our proposed approach, we provide the detailed visualize of the network information as mentioned below.NumberofTOTAL PACKET READS ,Latest packets read in a specific interval Number of TOTAL WRITES ON THE PACKETS, Latest packets write in a specific interval, Complete Input/output busy time, Complete CPU busy schedule, CompleteInput/outputReads, Latest number of seconds Input / Output reads Number of process info reported errors Number of spid’s reported error in the server, Authentication information's, Disabled services in the server In our system, we are trying to project the detailed view of how the problem occurred and possible solution for the servers.Intrusionrelatedinformation'swere considered and precautionary measures towardsintrusions will be addressed in our future work. 5. SYSTEM DESIGN FOR DISTRIBUTION OF DATA 6. SYSTEM IMPLEMENTATION  Initial Virtual Machine Information Module:  Virtual Machine Disk Space Details Module:  Server Level Information Module:  Network Path Tracing Module (Server level data info module):  Read/Write Status Module:  Application Log Events Visualization Module:  User Contexts Visualization Module 7. MODULE DESCRIPTION 7.1 Initial Virtual Machine Information Module: The Initial Virtual Machine Information Module defines the network and traces the initial; machine information using the algorithm Data Stream Model and the k-ary Sketch Algorithm which is generable from a network, and produces a network N such that is generable from N and not from any other network. Machine Name will bedefined.ServerName(instanceName) will be noted. Edition Installed will be updated. Product Build Information Level info will be shown. SP Level & Collation Type will be fixed Last Query/Server usage will be monitored Number of Cup's Used is notified Hyper Thread OS Level will be well-defined Memory(MB) will be observed. Virtual Memory(MB) will be shown. MAX Worker Count will be acquainted OD Priority Class will be noted. Scheduler Count will be traced.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 688 7.2 Virtual Machine Disk Space Details Module: The Disk Space Details modules define the “Virtual Disk Space Details information” such as Drive info details (C:/DRIVE, E: DRIVE), Also the memory/Free space allocation in Megabyte(MB) will be observed. 7.3 Server Level Information Module The Server level information module tends to define The Number of packets Received/Send Status will be notified. Along with that the Graphical Representation of the server level status information will be notified and shown in the graphical illustration. The network packets info will also be defined in this module by indicating the packer revived status, Packets sent status & the Error packets status. 7.4 Network Path Tracing Module (Server level data info module) Path tracing is a graphical method of rendering traces of the data navigation happening in the network such that the global illumination is faithful to reality. This algorithm is integrating over all accumulation of data arriving to a single point on the surface of an object. This accumulation is then reduced by an into sub paths based on the different access points in different intervals. Following items were visualized under this module: Number ofTOTAL PACKET READS (In terms of bytes) since the last server was started Latest packets read in a specific interval (Data read in bytes) Number OF TOTAL WRITES ON THE PACKETS (In terms of bytes) since the last server starts Latest packets write in a specific interval (Data read in bytes)connection estabilished. 7.5 Read/Write Status Module Security events from the server and the interaction with the client were visualized in the module: Detailed analytical values of a login have been added or removed as a database user to a database. Detailed analytical values of a login were added or removed from a fixed server role. Detailed analytical values of a login have been added to or removed from a role. Detailed analytical valuesofa database role were added to or removed from a database. Detailed analytical values of a login have been added or removed. Detailed analytical values of a password have been changed for an application role. Detailed analytical valuesofa backup or restore statement has been issued. Reports audit messages related to Service Broker dialog security. Reports audit messages related to Service Broker transport security. Indicates that an audit trace modification has been made. Indicates that the permissions to change the ownerof a database have been checked. 7.6 Application and Log Events Visualization Module Security events from the server and the interaction with the client were visualized in the module: Successful trusted logins, successful non-trusted logins, failed user logins. 7.7 USER CONTEXTS Visualization Module User contexts information were visualized in the module, Identity management indicates the management of individual identifiers, their authentication, authorization privileges/permissions within or across system and enterprise boundaries with the goal of increasing security and productivity. Identity management systems, products, applications, and platforms are commercial Identity management solutions implemented for enterprises and organizations. Technologies, services, and terms related to Identity management include Active Directory, Service Providers, Identity Providers, Web Services, Access control, Digital Identities, Password Managers, Single Sign-on, Security Tokens, Security Token Services. 8. SCREEN SHOTS HOMEPAGE SERVER DETAILS EXTRACTION
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 689 NUMBER OF PACKETS RECIEVED/SEND STATUS LAST EXECUTION REQUEST ON SERVER READS/WRITES LATENCY AND BYTES TRANSFER INFO WITH VIRTUALIZED SERVER USER LOG EVENT TRACING USER CONTEXT VALUE 9. CONCLUSION As the number of security related events generated in modern networks is on the rise, the need for network security visualization systems is felt more than ever. In this paper, we have examined recent works in network security visualization from a use-case perspective. Five use-case classes, each representing a different application area, were defined and several recent works in each category were thoroughly described. We detailed the underlying data sources of network security visualization and gave a few examples of each category. Analysis of these systems motivated us to examine several issues and concerns surrounding this emerging field. We elaborated on the advantages and shortcomings of all use-case classes and shed light on paths thatresearchersshouldfocustoward. We aggregated the findings ofourwork intoaninformativetable for future references. While the field of visualization is as wide as imagination allows, we hope that the analysis and taxonomy presented here will motivatebetterfuture work in this area.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 690 FUTURE ENHANCEMENTS In future work, field. We elaborated on the advantages and shortcomings of all use-case classes and shed light on paths that researchers should focus toward. We aggregated the findings of our work into an informative table for future references. While the field of visualization wide. REFERENCES [1] C. Ware, Information Visualization: Perception for Design. Morgan Kaufmann Publishers, Inc., 2004. [2] G. Conti, Security Data Visualization. No Starch Press, 2007. [3] R. Marty, Applied Security Visualization. Addison- WesleProfessional, 2008. [4] R. Erbacher, K. Walker, and D. Frincke, “Intrusion and Misuse Detection in Large-Scale Systems,” IEEE Computer Graphics and Applications, vol. 22, no. 1, pp. 38-48, Jan./Feb. 2002. [5] R. Erbacher, “Intrusion Behavior Detection through Visualization,” Proc. IEEE Int’l Conf. Systems, Man and Cybernetics, pp. 2507- 2513, 2003. [6] T. Takada and H. Koike, “Tudumi: Information Visualization System for Monitoring and AuditingComputer Logs,” Proc. Sixth Int’l Conf. Information Visualization, pp. 570-576, 2002. [7] K. Lakkaraju, W. Yurcik, and A. Lee, “NVisionIP: Netflow Visualizations of System State for Security Situational Awareness,” Proc. ACM Workshop Visualization and Data Mining forComputer Security, vol. 29, pp. 65-72, 2004.