Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Implementation of Customized Network Monitoring Tool and Security Framework Monitoring System

Print
PDF
IJCA Proceedings on International Conference on Information and Communication Technologies
© 2014 by IJCA Journal
ICICT - Number 2
Year of Publication: 2014
Authors:
Manjunath Kotari
Sunil Manohar Dasharathi
Niranjan N. Chiplunkar

Manjunath Kotari, Sunil Manohar Dasharathi and Niranjan N Chiplunkar. Article: Implementation of Customized Network Monitoring Tool and Security Framework Monitoring System. IJCA Proceedings on International Conference on Information and Communication Technologies ICICT(2):20-24, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Manjunath Kotari and Sunil Manohar Dasharathi and Niranjan N. Chiplunkar},
	title = {Article: Implementation of Customized Network Monitoring Tool and Security Framework Monitoring System},
	journal = {IJCA Proceedings on International Conference on Information and Communication Technologies},
	year = {2014},
	volume = {ICICT},
	number = {2},
	pages = {20-24},
	month = {October},
	note = {Full text available}
}

Abstract

In the direction of cram the monitoring systems and identifying parameters that can be monitored with or without encrypting the data in an Adaptive Distributed System (ADS) which changes dynamically in the real time environment. By knowing the parameters the system can work more effectively by doing the necessary changes. The two problems that are addressed here are monitoring a system and collecting data necessary for adaptation, may cause security problems. In this paper we are addressing customized monitoring tool with the help of two modules. One of the module is System Under Study(SUS), a node in a distributed system; which sets the security level of its parameters like IP Address, Host-ID etc. and in turn it gives the permissions for monitoring same with or without encryption. Other module is Network Monitoring Tool(NMT), a monitoring node in a distributed system; gets the different parameters of SUS in encrypted format or unencrypted format depending on the security level set by SUS and decrypt its values for the purpose of adaptation in the distributed systems.

References

  • Manjunath Kotari , Niranjan N. Chiplunkar, Nagesh H R , Security Aspects of Adaptive Distributed Systems and proposed solutions by ANUSANDHANA-Journal of Science, Engineering and Management-Vol-01, Issue-01, March-2012. (pp 45-49)
  • R. D. Schlichting (1998). Designing and Implementing Adaptive Distributed Systems, available at http://www. cs. arizona. edu/adaptiveds/overview. html.
  • Demissie B. Aredo, METRICS FOR QUANTIFYING THE IMPACTS OF MONITORING ON SECURITY OF ADAPTIVE DISTRIBUTED SYSTEMS. MASTER THESIS PROPOSAL – II, http://www. ifi. uio. no/~demissie (December 2005. ).
  • Aredo D. and Yildirim S. , Security Issues in Adaptive Distributed Systems. Proceedings of the Fourteenth European Conference on Information Systems (ECIS 2006), Goteborg, Sweden.
  • Ioannis Konstantinou, Dimitrios Tsoumakos, and Nectarios Koziris, PASS It ON (PASSION): An Adaptive Online Load-Balancing Algorithm for Distributed Range-Query Specialized Systems, OTM 2008 Workshops, LNCS 5333, pp. 3–5, 2008, Springer-Verlag Berlin Heidelberg 2008.
  • David Breitgand1, Rami Cohen2, Amir Nahir1, and Danny Raz2, On Fully Distributed Adaptive Load Balancing,DSOM 2007, LNCS 4785, pp. 74–85, 2007. ,IFIP International Federation for Information Processing 2007.
  • http://netsecurity. about. com/cs/generalsecurity
  • Joan Daemen, Vincent Rijmen, Advanced Encryption Standard, publication of Federal Information Processing Standard (FIPS), May-2001
  • David Breitgand, Rami Cohen, Amir Nahir, and Danny Raz, On Cost-Aware Monitoring for Self-Adaptive Load Sharing, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 1, JANUARY 2010
  • Chun-Chieh Yang1, Ssu-Hsuan Lu1, Hsiao-Hsi Wang1, and Kuan-Ching Li2, On Design and Implementation of Adaptive Data Classification Scheme for DSM Systems, ISPA 2006, LNCS 4330, pp. 794 – 805, 2006. Springer-Verlag Berlin Heidelberg 2006.