[go: up one dir, main page]

0% found this document useful (0 votes)
224 views3 pages

Network Security Monitoring System IEEE Paper

1. The document describes a network security monitoring system (NSMS) that allows users to monitor network activity and ensure security. It provides features like website blocking, session monitoring, and keylogging to give users better network control and prevent unauthorized access. 2. Some problems the NSMS aims to address are abuse of user privileges, irrelevant searches, and need for real-time monitoring. The system works by monitoring other devices, tracking login/logout sessions, extracting keystrokes, and blocking restricted sites. 3. The paper reviews four research papers on NSMS that discuss reliable operation, alarm displays, security event analysis, and a component-based security control architecture for information networks.

Uploaded by

Musab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
224 views3 pages

Network Security Monitoring System IEEE Paper

1. The document describes a network security monitoring system (NSMS) that allows users to monitor network activity and ensure security. It provides features like website blocking, session monitoring, and keylogging to give users better network control and prevent unauthorized access. 2. Some problems the NSMS aims to address are abuse of user privileges, irrelevant searches, and need for real-time monitoring. The system works by monitoring other devices, tracking login/logout sessions, extracting keystrokes, and blocking restricted sites. 3. The paper reviews four research papers on NSMS that discuss reliable operation, alarm displays, security event analysis, and a component-based security control architecture for information networks.

Uploaded by

Musab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

NETWORKING SECURITY MONITORING

SYSTEM
Mohammed Musab#1, Sahil Mulla#2Ashraf shaikh#3, Farhaan Siddiqui#4
#
Mohammed Musab Department of Information Technology
#
Sahil Mulla Department of Information Technology
#
Ashraf Shaikh Department of Information Technology
#
Farhaan Siddiqui Department of Information Technology
M.H. Saboo Siddik Polytechnic, India

musabimp.0@gmail.com
1

sahilmulla029@gmail.com
2
3
ashrafshaikh11430@gmail.com
4
fazerin802@gmail.com

Abstract— A network monitoring system that allows 1. Abuse of user account privileges:
users to keep track of their network's activity and ensure According to data cited by the Harvard Business
its security. It provides features such as website blocking, Review, for the year of 2016, “60% of all attacks were
session time monitoring, and even key logging. These carried out by insiders.” Whether it’s because of
features enable individuals and businesses to have better honest mistakes (accidentally sending info to the
control over their networks, limit the access of unwanted wrong email address or losing a work device),
sites or users, and prevent unauthorized access to
intentional leaks and misuse of account privileges
sensitive data.
2. Irrelevant searches:
Students in college or a person at work may not be
Keywords— NSMS, Keylogging, RTMS allowed to use social Medias in their pc, with the help
of our key logger feature they will be monitored with
every search.
I. INTRODUCTION
3. Real time monitoring:
A. Definition Real-time monitoring is the employment of
applications and tools that track and record continuous
A network monitoring system that allows snapshots of your network’s overall performance.
users to keep track of their network's activity and Organizations use real-time monitoring to track
ensure its security. It provides features such as website network activity, improve network security, and
blocking, session time monitoring, and even key identify potential problems as soon as they arise.
logging. These features enable individuals and Every business, regardless of size, can benefit from
businesses to have better control over their networks, monitoring their network in real time.
limit the access of unwanted sites or users, and
prevent unauthorized access to sensitive data. IV. METHODOLOGY

II. BASIC CONCEPTS OF OUR SYSTEM Main aim in developing this system is to monitor the
network of other devices. The system can identify
Businesses rely on networks for all operations. Hence, when the user login in and when the user logs out
network monitoring is very crucial for any business. known as Session time. The NSMS can also extract
Today, networks span globally, having multiple links the information of the key pressed actions of the end
established between geographically separated data user, it can also block sites which the user cannot
centers, public and private clouds. This creates access.
multifield challenges in network management.  Our system can be used in many places for
Network admins need to be more proactive and agile eg:
in monitoring network performance.  Banks may use network monitoring to detect
and prevent fraudulent activities, such as
Overall, an NSMS is an essential component of a phishing or other cyber-attacks aimed at
comprehensive cyber security strategy, enabling stealing sensitive information.
organizations to proactively monitor.  Computer labs may use net
 Hospitals may use network monitoring to
III. PROBLEM STATEMENT
ensure that patient data remains secure and
confidential, and to prevent unauthorized this project that address reliable, site-independent
access to critical systems or equipment. operation. Major concepts presented include the use of
operator workstations, map-based alarm displays,
V. OBJECTIVE rulebased incident assessment, and computer-aided
configuration management. Published in: Proceedings
Security monitoring is a key cloud security strategy Institute of Electrical and Electronics Engineers 1988
that has several important purposes for CSPs and International Carnahan Conference on Security
tenants, these include: O Threat Detection Some Technology, Crime Countermeasures Publisher: IEEE
exploits may not be preventable and some threats may
not be anticipated, and in this sense, monitoring is the 3. Design of security integrated monitoring system
last line of defense. But there is a difference between Abstract: The development of Internet of things
detecting a security situation and doing something technology has brought about changes in the
about it. O Verification of Security Controls although monitoring industry. The integration of video
most security controls are oriented toward enforcing monitoring and defence monitoring system based on
security policy, monitoring is used to verify the video technology and sensor technology becomes
correct operation of other security controls. If events
possible. In this paper, combined with the widely used
which indicate actions prohibited by policy appear in
video monitoring equipment and defence monitoring
the security event stream, this would indicate that
policy is not being correctly enforced by security equipment in the current market, as well as the
controls. O a Legal Record of Activity Security event corresponding software interface, a set of integrated
data can form a legal record of actions that users or security monitoring software system with defence
processes performed. To be used in a legal monitoring and video monitoring functions is
proceeding, this data must have verifiable integrity designed, which can quickly make video response in
(records have not been altered and they comprise a the defence alarm. At the same time, this paper
complete record) and the organization must be able to discusses the key technical problems that need to be
demonstrate chain of custody over the data. solved in the practical application of the system.
Published in: 2021 work monitoring to ensure that
VI. RESEARCH PAPERS ON NSMS students are not accessing prohibited content or
engaging in inappropriate activities while using lab
1. Network Security Monitoring Chapter Abstract:
resources.
Network security monitoring remains a vital
component for incident response, threat hunting, and IEEE 4th International Conference on Information
network security in general. This chapter focuses on Systems and Computer Aided Education (ICISCAE)
network activity and explores the Elastic Stack and Publisher: IEEE
ways to integrate host‐based data to provide enhanced
visibility across the network. It examines the 4. Component Based Security Control for
architecture for deployment of Security Onion in an Information Network Abstract: It is a complex
enterprise and each of the major tools integrated into engineering to protect the security of information
the platform. The chapter outlines basic skills to network (info-net), so it is necessary to study out a
facilitate effective incident response for those new security control architecture and model in the
situations where the critical data that reader need has view of systemic control. According to the
not been conveniently placed into Elastic Stack or characteristics and security demands of info-net, a
another analysis platform. The Elastic Stack provides new security control viewpoint and its architecture
an amazing platform to support incident response, but based on components is proposed, the security control
readers occasionally will need to access other data system is built, and details about the structure of
sources directly on a host or that otherwise have not control framework, its various types, and functions
been ingested into a centralized analysis platform. and propagation modes of security control
Web servers, nix systems, and other applications store components are introduced, then the features of the
many of their logs in a text‐based format. Publisher: control system are summarized in the end Published
Wiley Data and Cyber security in: The Proceedings of the Multiconference on
"Computational Engineering in Systems Applications"
Publisher: IEEE Publisher: IEEE (Yu Wang; Jun Lu; Zhongwang Wu;
Yu Lu)
2. Integrated workstations for reliable, site-
independent security monitoring and control Abstract: 5. Construction of Network Security Perception
The Security Console Project at Lawrence Livermore System Using Elman Neural Network Abstract: the
National Laboratory has designed and implemented a purpose of the study is to improve the security of the
series of security communications command centers network, and make the state of network security
for monitoring and controlling its physical security predicted in advance. First, the theory of neural
systems. The author discusses the important aspects of networks is studied, and its shortcomings are analyzed
by the standard Elman neural network. Second, the
layers of the feedback nodes of the Elman neural
network are improved according to the problems that
need to be solved. Then, a network security perception
system based on GA-Elman (Genetic Algorithm-
Elman) neural network is proposed to train the
network by global search method. Finally, the
perception ability is compared and analyzed through
the model. The results show that the model can
accurately predict network security based on the
experimental charts and corresponding evaluation
indexes. The comparative experiments show that the
GA-Elman neural network security perception system
has a better prediction ability. Therefore, the model
proposed can be used to predict the state of network
security and provide early warnings for network
security administrators. Published in: 2021 2nd
International Conference on Computer
Communication and Network Security (CCNS)
Publisher: Yun; Huang Qiang; Ma Yixuan

VIII. ACKNOWLEGEMENT

The National Conference conducted by Thakur


Polytechnic of Engineering gave this opportunity to
share our study in field of NSMS.

First we would like to express our gratitude to all


committee members who put their precious time for
arrangement of this conference. We received constant
encouragement from our colleagues and friends which
made our paper much easier and be completed in time.

IX. REFERENCES

[1] A.Attar and S.Hazelhurst. Fast packet filtering


using n-ary decision diagrams. 2002. Technical
Report, School of Computer Sciene, University
of the Witwatersrand.
[2] D. Antoš. Hardware-constrained Packet
Classification. PhD thesis, Masaryk University,
2006.
[3] 2017 Norton Cyber Security Insights Report,
[online] Available:
https://www.symantec.com/content/dam/symante
c/docs/about/2017-ncsir-global-comparison-
united-kingdomen.pdf.
[4] C.J. Fung and R. Boutaba, Design and
Management of Detection Networks, 2013.

[5] Collaborative Intrusion

You might also like