CFP last date
20 December 2024
Reseach Article

Implementation of Customized Network Monitoring Tool and Security Framework Monitoring System

Published on October 2014 by Manjunath Kotari, Sunil Manohar Dasharathi, Niranjan N. Chiplunkar
International Conference on Information and Communication Technologies
Foundation of Computer Science USA
ICICT - Number 2
October 2014
Authors: Manjunath Kotari, Sunil Manohar Dasharathi, Niranjan N. Chiplunkar
4ac01f41-c917-4f25-8b8f-c0c3c402e7ba

Manjunath Kotari, Sunil Manohar Dasharathi, Niranjan N. Chiplunkar . Implementation of Customized Network Monitoring Tool and Security Framework Monitoring System. International Conference on Information and Communication Technologies. ICICT, 2 (October 2014), 20-24.

@article{
author = { Manjunath Kotari, Sunil Manohar Dasharathi, Niranjan N. Chiplunkar },
title = { Implementation of Customized Network Monitoring Tool and Security Framework Monitoring System },
journal = { International Conference on Information and Communication Technologies },
issue_date = { October 2014 },
volume = { ICICT },
number = { 2 },
month = { October },
year = { 2014 },
issn = 0975-8887,
pages = { 20-24 },
numpages = 5,
url = { /proceedings/icict/number2/17970-1414/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Information and Communication Technologies
%A Manjunath Kotari
%A Sunil Manohar Dasharathi
%A Niranjan N. Chiplunkar
%T Implementation of Customized Network Monitoring Tool and Security Framework Monitoring System
%J International Conference on Information and Communication Technologies
%@ 0975-8887
%V ICICT
%N 2
%P 20-24
%D 2014
%I International Journal of Computer Applications
Abstract

In the direction of cram the monitoring systems and identifying parameters that can be monitored with or without encrypting the data in an Adaptive Distributed System (ADS) which changes dynamically in the real time environment. By knowing the parameters the system can work more effectively by doing the necessary changes. The two problems that are addressed here are monitoring a system and collecting data necessary for adaptation, may cause security problems. In this paper we are addressing customized monitoring tool with the help of two modules. One of the module is System Under Study(SUS), a node in a distributed system; which sets the security level of its parameters like IP Address, Host-ID etc. and in turn it gives the permissions for monitoring same with or without encryption. Other module is Network Monitoring Tool(NMT), a monitoring node in a distributed system; gets the different parameters of SUS in encrypted format or unencrypted format depending on the security level set by SUS and decrypt its values for the purpose of adaptation in the distributed systems.

References
  1. Manjunath Kotari , Niranjan N. Chiplunkar, Nagesh H R , Security Aspects of Adaptive Distributed Systems and proposed solutions by ANUSANDHANA-Journal of Science, Engineering and Management-Vol-01, Issue-01, March-2012. (pp 45-49)
  2. R. D. Schlichting (1998). Designing and Implementing Adaptive Distributed Systems, available at http://www. cs. arizona. edu/adaptiveds/overview. html.
  3. Demissie B. Aredo, METRICS FOR QUANTIFYING THE IMPACTS OF MONITORING ON SECURITY OF ADAPTIVE DISTRIBUTED SYSTEMS. MASTER THESIS PROPOSAL – II, http://www. ifi. uio. no/~demissie (December 2005. ).
  4. Aredo D. and Yildirim S. , Security Issues in Adaptive Distributed Systems. Proceedings of the Fourteenth European Conference on Information Systems (ECIS 2006), Goteborg, Sweden.
  5. Ioannis Konstantinou, Dimitrios Tsoumakos, and Nectarios Koziris, PASS It ON (PASSION): An Adaptive Online Load-Balancing Algorithm for Distributed Range-Query Specialized Systems, OTM 2008 Workshops, LNCS 5333, pp. 3–5, 2008, Springer-Verlag Berlin Heidelberg 2008.
  6. David Breitgand1, Rami Cohen2, Amir Nahir1, and Danny Raz2, On Fully Distributed Adaptive Load Balancing,DSOM 2007, LNCS 4785, pp. 74–85, 2007. ,IFIP International Federation for Information Processing 2007.
  7. http://netsecurity. about. com/cs/generalsecurity
  8. Joan Daemen, Vincent Rijmen, Advanced Encryption Standard, publication of Federal Information Processing Standard (FIPS), May-2001
  9. David Breitgand, Rami Cohen, Amir Nahir, and Danny Raz, On Cost-Aware Monitoring for Self-Adaptive Load Sharing, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 1, JANUARY 2010
  10. Chun-Chieh Yang1, Ssu-Hsuan Lu1, Hsiao-Hsi Wang1, and Kuan-Ching Li2, On Design and Implementation of Adaptive Data Classification Scheme for DSM Systems, ISPA 2006, LNCS 4330, pp. 794 – 805, 2006. Springer-Verlag Berlin Heidelberg 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Adaptive Distributed System (ads) Network Monitoring Tool (nmt) system Under Study(sus)