Académique Documents
Professionnel Documents
Culture Documents
Abstract
Network traffic is becoming more and more
difficult to monitor and analyze especially in high
bandwidth networks and there are certain aspects of
networking that must be upheld at all times. These
include the system ability to defend and mitigate
security threats, bandwidth usage, Response Time
and latency, Scalability and geographic location. The
benefits of Network monitoring systems are outlined
within this paper. However there are some
disadvantages coming alongside these inventions. My
paper will be an evaluation of some of the Current
Computing Research Aimed at Improving Online
Security suggested by network experts.
1. Introduction
Geddes et al, (2008) states that computer
networks are complex systems, consisting of many
heterogeneous hardware and software components.
Monitoring systems are often employed to make
computer networks more manageable and to track
malicious users and programs in the networks.
According to Xuren, (2009) networks can all
be violated by professional hackers, company
competitors, or even internal employees. This
introduces an implementation of a network
monitoring systems (NMS) to combat them. NMS
implementation has been integrated with other
protection tools, such as firewall, IDS, and scanning
tools to ensure and improve online security as
NZhenqi (2009) makes it clear that content-based
network monitoring technology is a further
development on firewall.
NMS is the development which came with a
powerful mechanism for enhancing online security
which has been breached and jeopardized over past
the years as the network scaled up. Geddes et al,
2. Literature Review
The Internet has gradually turned into the
fastest growing section of the network at large. This
also draws more attention to the security aspect
because the possible design flaws and its
vulnerability to attacks. A successful attack on a
system on the Internet can pose a major threat
because it can influence the system performance and
the services used by millions of users. (Abba et al,
2006).
2.1.1 An Autonomous
MOnitoring System (ANEMOS)
NEtwork
under LAN.
Monitoring initiatives designed for WAN
involves the implementation of some network
monitoring protocols and tools (active and passive
monitoring tools) to enforce online security,
(Grigoriev, M. and Cottrell, L.) introduces the use of
PING which monitors traffic delay, latencies and
loss of packets and Traceruote which in its
development helps to determine topology of the
network. (Cecil 2006) defines another protocol
namely SNMP which is a protocol found in the
application layer of the layered protocol stack of the
internet that is the TCP/IP protocol suite. Through its
wide range capabilities it allows network
administrators and analysts to manage network
performance, mitigate and troubleshoot network
problems, this enable SNMP protocol to gather
traffic statistics and reports through passive sensors
that are implemented from router to end host.
These tools are implemented to protect the network
from hackers, human error, disgruntled employees,
criminals and they Defend and Mitigate Security
Threats; this on the other hand can have some
drawbacks,
Lippis (2009) further suggest that WAN can be
integrated with other security services such as
Network Access Control, Intrusion Detection
Services /Intrusion Protection Services and Network
Foundation Protection to mitigate both internal and
external security threats. The key to security as a
WAN Service is that its implemented end-to-end
within the network and WAN aggregation routers
enabling a uniformed deployment, management
environment and secure user experience network
wide.
System
Application:
is
concerned
with
implementing particular applications, such
as the World Wide Web (WWW), the
Domain Name System (DNS), e-mail etc.
Typical application protocols include HTTP
for WWW, DNS for DNS, and SMTP for email.
3.1 Defend
threats
and
mitigate
security
3. Critical Evaluation
The impacts caused by the technical
approaches on networking monitoring as well as
networks at large are clearly visible and they can
either have a positive or negative impact due to
some of the shortcomings of these approaches. This
section seeks to unfold these shortcomings and
evaluate the level at which these approaches enforce
online security. As far as network monitoring is
concerned, the concept of online security is a major
challenge. This section focuses on the critical
evaluation of those aspects.
Technical approaches proposed in Section 2
must take into account the unique properties of a
network monitoring system. The following criteria
will be used to evaluate the approaches reviewed in
the previous section; ability to defend and mitigate
security threats, bandwidth usage, Response Time
5. Conclusion
Based on an evaluation of the current computing
research aimed at improving online security,
combined with several technical approaches for
References
[1] Vincent Geddes,(2008), Design and Implementation
of a Scalable Network Monitoring System,
Department Of Computer Science, University Of
Cape Town, Cape Town, HONOURS REPORT, pp
1-27, [Online] IEEE Digital Library [Accessed on]
23rd August 2011.
[2] Wang Xuren, He Famei, (2009), An Implement of
Broadband Network Monitoring System Based on
Libnids and Winpcap, 2009 International Conference
on New Trends in Information and Service Science,
Information Engineering College of Capital Normal
University, Beijing, pp1-3, [Online] IEEE Digital
Library [Accessed on] 23rd August 2011.
[3] Wang Zhenqi, WangXinyu (2009) , The Research
And Design Of Content-Based Network Monitor
System, Information and Network Management
Center North China Electric Power University,
China, pp 68, [Online] , [Online] IEEE Digital