Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications
ISSN: 2320-7248 Impact Factor:1.8 Volume:5 Issue:3 Year: 10 March,2022 Pages:229-235
— Network monitoring enables the administrators to monitor a computer network for slow or failing components. In case of outages or other troubles the administrator can pinpoint where the exact issue is the system enables us to find out List of services in the target machine Read Memory / Time / Usage Write Memory / Time / Usage Performance/Speed of the system in writing / reading data Access specifications, like => Login Details => Access to each login => Database lists => Access to the databases => Server Role / Members Group => Database Roles
network monitoring, computer network.
[1] C. Ware, Information Visualization: Perception for Design. Morgan Kaufmann Publishers, Inc., 2004. [2] G. Conti, Security Data Visualization. No Starch Press, 2007. [3] R. Marty, Applied Security Visualization. Addison-WesleProfessional, 2008. [4] R. Erbacher, K. Walker, and D. Frincke, “Intrusion and Misuse Detection in Large-Scale Systems,” IEEE Computer Graphics and Applications, vol. 22, no. 1, pp. 38-48, Jan./Feb. 2002. [5] R. Erbacher, “Intrusion Behavior Detection through Visualization,” Proc. IEEE Int’l Conf. Systems, Man and Cybernetics, pp. 2507- 2513, 2003. [6] T. Takada and H. Koike, “Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs,” Proc. Sixth Int’l Conf. Information Visualisation, pp. 570-576, 2002. [7] K. Lakkaraju, W. Yurcik, and A. Lee, “NVisionIP: Netflow Visualizations of System State for Security Situational Awareness,” Proc. ACM Workshop Visualization and Data Mining forComputer Security, vol. 29, pp. 65-72, 2004.