3 juncture based issuer driven pull out system in distibuted servers

Kanimozhi.M,Siva sankari.A,Kanimozhi.K

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 08 May,2018         Pages:1395-1399

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Network level Security visualization is considered to be one of the foremost area where most of the exploration is going on in visualizing the network nature for the systems. There are many major procedures and technological jargons dominating the security related stuffs in the it industry. Ibm tivoli, spiceworks, xymon, intermapper are some of the major tools available in the market. Most of the tools picturize by monitoring certain items in the network/server. In our project, our focused areas include host/server monitoring, internal and external monitoring, port activity and attack patterns. Network tomography is an important area of network measurement, which deals with monitoring the health of various links in a network using end-to-end probes sent by agents located at vantage points in the network/internet.

Kewords

Keywords—Relevance to network security, data processing, visual techniques, Satisfactoriness.

Reference

[1] C. Ware, Information Visualization: Perception for Design. Morgan Kaufmann Publishers, Inc., 2004. [2] G. Conti, Security Data Visualization. No Starch Press, 2007. [3] R. Marty, Applied Security Visualization. Addison-WesleProfessional, 2008. [4] R. Erbacher, K. Walker, and D. Frincke, “Intrusion and Misuse Detection in Large-Scale Systems,” IEEE Computer Graphics and Applications, vol. 22, no. 1, pp. 38-48, Jan./Feb. 2002.