![]() UNEC, Scientific-Research Institute of Economic Studies,ĭepartment of knowledge economy, senior research fellow Ph.D., Associate Professor Farhad Gamboy oglu Mikayilov The functionality of the proposed system was tested and results showed that the proposed system has 100% anomaly network intrusion detection rate and better functional features as compared to the existing network monitoring applications observed.ĬORPORATE SOCIAL RESPONSIBILITY IN RESOURCE-RICH COUNTRIES EFFECTS ![]() Suitable programming languages and development environment such as Java, JavaScript, Hypertext Preprocessor, Hypertext markup language and MySQL were used in coding the software prototype. The proposed model was developed using use-case and sequence diagrams. Iterative software model was adopted as the software development life cycle based on its strengths and suitability. Data about the existing and proposed model was gathered using key informant interview approach, and observation of the existing software. This research paper was designed to tackle the problems exhibited by the existing network monitoring application by integrating different network monitoring services in a single model using the power of agent’s distributed processing and monitoring services. Monitoring complex computer network environment is now a very challenging task for network administrators despite the various existing monitoring applications for networks that are faced with the issues of centralized monitoring, which causes network traffic, reduces network bandwidth, and are unable to concurrently run two or more network services. The proposed system is highly recommended for usage in any local area network environment. Results revealed detection rate to be high and with a very minimal false alarm rate. The system was tested for its effectiveness and efficiency in both non-production and production network environment. Java programming language was used to implement the 2DES algorithm in the security mechanism proposed. This research work used a 2 Factor or Double Data Encryption Standard (DES) approach to encrypt / decrypt messages between agents in our proposed network monitoring platform to prevent malicious agent from hijacking the exact network data content during communication. Several techniques like fault isolation or sandboxing, access control to host resources, digital signatures, strong authentication, proof carrying code and message encryption were suggested by different research scholars as a means of mitigating the menace but however, no strong evidence on their application / implementation were mentioned. This research paper examined the security threat issues against agents/multi-agent based system platform by malicious agent attackers in a network environment. The comparison will show that the proposed.Net framework open source solution contains extra features that do not exist in neither commercial nor open source solutions. The proposed.Net solution is comparable with commercial and open source solutions. It can be used by a single PC to monitor that PC’s network or can be installed on a gateway PC to monitor the entire network. The solution aims to be a.Net framework open source product that is flexible to be adapted to the user's needs. The problem of having a flexible, free and modern, in respect to the common industry knowledge, Network Monitoring tool is the goal of this paper. Network Monitoring tools are usually costly and not flexible enough to be adapted to the needs of the user. Network Monitoring tools aim to audit and keep track of certain parameters to ensure the network’s efficiency and to provide information that will assist in the network analysis. ![]() Such resources needed to be monitored are the Memory, the CPU, the Power Consumption and the Network. Tools that monitor the performance of a PC are an essential part of today’s quality control of the computer systems.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |