pull strategized kernal monitoring with shell techinque

Manoj Kumar.R,

Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

ISSN: 2320-7248          Impact Factor:1.8         Volume:5         Issue:3         Year: 10 March,2022         Pages:229-235

International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

Abstract

— Network monitoring enables the administrators to monitor a computer network for slow or failing components. In case of outages or other troubles the administrator can pinpoint where the exact issue is the system enables us to find out  List of services in the target machine  Read Memory / Time / Usage  Write Memory / Time / Usage  Performance/Speed of the system in writing / reading data  Access specifications, like => Login Details => Access to each login => Database lists => Access to the databases => Server Role / Members Group => Database Roles

Kewords

network monitoring, computer network.

Reference

[1] C. Ware, Information Visualization: Perception for Design. Morgan Kaufmann Publishers, Inc., 2004. [2] G. Conti, Security Data Visualization. No Starch Press, 2007. [3] R. Marty, Applied Security Visualization. Addison-WesleProfessional, 2008. [4] R. Erbacher, K. Walker, and D. Frincke, “Intrusion and Misuse Detection in Large-Scale Systems,” IEEE Computer Graphics and Applications, vol. 22, no. 1, pp. 38-48, Jan./Feb. 2002. [5] R. Erbacher, “Intrusion Behavior Detection through Visualization,” Proc. IEEE Int’l Conf. Systems, Man and Cybernetics, pp. 2507- 2513, 2003. [6] T. Takada and H. Koike, “Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs,” Proc. Sixth Int’l Conf. Information Visualisation, pp. 570-576, 2002. [7] K. Lakkaraju, W. Yurcik, and A. Lee, “NVisionIP: Netflow Visualizations of System State for Security Situational Awareness,” Proc. ACM Workshop Visualization and Data Mining forComputer Security, vol. 29, pp. 65-72, 2004.