Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:6 Issue:3 Year: 08 May,2018 Pages:1395-1399
Network level Security visualization is considered to be one of the foremost area where most of the exploration is going on in visualizing the network nature for the systems. There are many major procedures and technological jargons dominating the security related stuffs in the it industry. Ibm tivoli, spiceworks, xymon, intermapper are some of the major tools available in the market. Most of the tools picturize by monitoring certain items in the network/server. In our project, our focused areas include host/server monitoring, internal and external monitoring, port activity and attack patterns. Network tomography is an important area of network measurement, which deals with monitoring the health of various links in a network using end-to-end probes sent by agents located at vantage points in the network/internet.
Keywords—Relevance to network security, data processing, visual techniques, Satisfactoriness.
[1] C. Ware, Information Visualization: Perception for Design. Morgan Kaufmann Publishers, Inc., 2004. [2] G. Conti, Security Data Visualization. No Starch Press, 2007. [3] R. Marty, Applied Security Visualization. Addison-WesleProfessional, 2008. [4] R. Erbacher, K. Walker, and D. Frincke, “Intrusion and Misuse Detection in Large-Scale Systems,” IEEE Computer Graphics and Applications, vol. 22, no. 1, pp. 38-48, Jan./Feb. 2002.