Analysis of an Integrated Security System using Real time Network Packets Scrutiny

Authors

  • Umamageswari K Student, Research Department of Computer Science, Indo – American College, Thiruvalluvar University, Vellore -632115, Tamilnadu, India.
  • Thiyagarajan L Head of the Department, Research Department of Computer Science, Indo – American College, Thiruvalluvar University, Vellore – 632115, Tamilnadu, India.
  • Kumar KPS Head of the Department, Department of Computer Applications, Indo – American College, Thiruvalluvar University, Vellore – 632115. Tamilnadu, India.

Keywords:

time Network Packet, Deep Packet Inspection (DPI), Advanced Persistent Threats (APT), Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Open System Interconnection (OSI) model

Abstract

With the tremendous growth of internet services, websites are becoming indispensable and common source through which they are made accessible to all. Intrusion by worms or viruses through the network is continuously increasing and evolving. Firewall and intrusion detection and prevention subsystem, and its functionality is becoming more advanced for the security system against external attacks that use various security vulnerabilities. As such, enterprises are investing in various measures for an integrated security system to identify the threats of network security-based security vulnerabilities and cope with theme effectively. In sum, the network visibility plane should facilitate the following changes in network monitoring for the purposes of promoting disaggregation of analytics tool functions for long term monitoring sustainability and flexibility. In this work, the network packet in-depth test-based, integrated security system that analyzes the threat factors through an overall study of network packets dispersed in real-time and applies various protection functions to manage with integrated security threats in the future.

References

Mohit Shrivastava and Chaitra, Dr. Rajashree Shettar, Proceedings of the International Conference , “Computational Systems for Health & Sustainability” A Novel Packet Classification technique for VoIP candidature in Deep Packet Inspection, April, 2015 - by R.V.College of Engineering, Bangalore, Karnataka, India.

Kiril Stoichev, “The need for establishment of professor for designer of Integrated Security Management System”, Institute of Metal

Science, Equipment and Technologies with Hydro aerodynamics Centre, Bulgarian Academy of Sciences, Sofia, Bulgaria International Journal of Economics, Commerce and Management United Kingdom, May 2015 .

Jackson, William. "Force multiplier: PSIM leverages video surveillance networks in Baltimore". GCN. 1105 Public Sector Media Group. Retrieved 24 April 2014.

"Physical Security Information Management (PSIM) Market in the APAC Region 2014-2018". Technavio. Infinti Research Limited. Retrieved 21 May 2014.

"Atlanta Operation Shield". Atlanta Police Foundation. Atlanta Police Foundation. Retrieved 24 April 2014.

Craighead, Geoffrey. "Special Report: Government Security - Sharing Video with Police". SecurityInfoWatch.com. Cygnus Business Media. Retrieved 24 April 2014.

"Frost & Sullivan: Compliance to Standard Operating Procedures will Fuel Uptake of PSIM Software". Frost & Sullivan. Frost & Sullivan.

Retrieved 24 April 2014.

Bremner, Paul. "PSIM software continues to see strong growth despite increased competition". IHS Technology. IHS Technology. Retrieved 21 May 2014.

"Global Physical Security Market is Expected to Reach USD 125.03 Billion in 2019: Transparency Market Research". Transparency Market Research. Transparency Market Research (TMR). Retrieved 24 April 2014.

M. Nicolett and K. M. Kavanagh, “Magic Quadrant for Security Information and Event Management,” Gartner Group, (2012) May.

Allot Communications (2007). “Digging Deeper Into Deep Packet Inspection(DPI).” H. Asghari, M. van Eeten and M. Mueller, “Unraveling the Economic and Political Drivers of Deep Packet Inspection”, GigaNet 7th Annual Symposium, (2012) Novmber 5.

BEREC, “BEREC response to EC questionnaire on specific aspects of transparency, traffic management and switching in an Open Internet”, (2012).

Jeong Beom Kim Professor, “A Study on the Development of Next Generation Intelligent Integrated Security Management Model using Big Data Technology” on International Journal of Security and Its Applications, Industry-Academic Cooperation Foundation,

Namseoul University), Vol. 9, No. 6 (2015), pp. 217-226.

Downloads

Published

2024-02-26

How to Cite

Umamageswari, K., Thiyagarajan, L., & Kumar, K. S. (2024). Analysis of an Integrated Security System using Real time Network Packets Scrutiny. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(11), 2006–2011. Retrieved from https://ijact.in/index.php/j/article/view/351

Issue

Section

Original Research Article

Similar Articles

<< < 15 16 17 18 19 20 21 22 23 24 > >> 

You may also start an advanced similarity search for this article.