Skip to main content

Network Monitoring of Cyber Physical System

  • Conference paper
  • First Online:
Intelligent Cyber Physical Systems and Internet of Things (ICoICI 2022)

Abstract

In the field of network and server security, every organization, no matter how big or small, has to adapt different monitoring techniques in relation with the servers and networks. Server attacks are a major threat in today’s world if the systems and networks and the host servers are vulnerable. Network and server monitors or administrators have to keep an eye over different tools for different purposes. Therefore, this paper offers a methodology with the help of which we propose to develop a tool that would ease up the work of server administrators. This tool would provide all the services that multiple other tools provide. This would help enhance the monitoring section of the web servers in particular by using different tools and modules with the help of python. This paper also explains and concludes that the tool being developed would be effective and efficient, and therefore save a lot of time and ensures security from threats related to servers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zeng W, Wang Y (2009) Design and implementation of server monitoring system based on SNMP. In: IEEE international joint conference on artificial intelligence, vol 3, pp 857–860

    Google Scholar 

  2. Roblee C, Berk V (2005) Implementing large-scale autonomic server monitoring using process query systems. In: IEEE proceedings of the second international conference on autonomic computing, pp 123–133

    Google Scholar 

  3. Yucheng L, Yubin L (2010) A monitoring system design program based on B/S mode. In: IEEE international conference on intelligent computation technology and automation, pp 184–187

    Google Scholar 

  4. Forrest S, Hoffmeyr S, Somayaji A, Longstaff T (1996) A sense of self for unix processes. In: IEEE symposium on security and privacy, pp 120–128

    Google Scholar 

  5. Nemeth E, Snyder G, Seebass S, Hein TR (1995) UNIX system administration handbook. Prentice Hall

    Google Scholar 

  6. Bohra A, Neantiu I, Gallard P, Sultan E, Iftode L (2004) Remote repair of operating system state using Backdoor. In: IEEE proceeding of the international conference on autonomic computing, pp 256–263

    Google Scholar 

  7. Kephart JO (2005) Research challenges of autonomic computing. In: Proceedings of the 27th international conference on Software engineering, IBM Thomas J. Watson Research Center, USA

    Google Scholar 

  8. Tsoa FP, Jouet S, Pezaros DP (2016) Network and server resource management strategies for data centre infrastructures: a survey. Comput Netw 106:209–225

    Google Scholar 

  9. Thirukonda MM, Becker SA (2002) WebSpy: an architecture for monitoring web server availability in a multi-platform environment. Technical report CS-2002-07, Computer Science Department, Florida Institute of Technology

    Google Scholar 

  10. Sihyung L, Kyriaki L, Hyong SK (2014) Network monitoring: present and future. Comput Netw 65:84–98

    Google Scholar 

  11. Suri S, Batra V (2010) Comparative study of network monitoring tools. Int J Innovative Technol Exploring Eng (IJITEE) 1(3):63–65

    Google Scholar 

  12. Trimintzios P, Polychronakis M, Papadogiannakis A, Foukarakis M, Markatos EP, Oslebo A (2006) DiMAPI: an application programming interface for distributed network monitoring. In: Conference on network operations and management symposium, pp 382–439

    Google Scholar 

  13. Fang W, Zhijin Z, Xueyi Y (2008) A new dynamic network monitoring based on IA. In: IEEE international symposium on computer science and computational technology. IEEE, pp 637–640

    Google Scholar 

  14. Bonelli N, Giordano S (2016) Network traffic processing with PFQ. IEEE J Sel Areas Commun 34(6):1819–1833

    Article  Google Scholar 

  15. Bashar A, Smys S (2021) Physical layer protection against sensor eavesdropper channels in wireless sensor networks. IRO J Sustain Wirel Syst 3(2):59–67

    Google Scholar 

  16. Haoxiang W, Smys S (2020) Secure and optimized cloud-based cyber-physical systems with memory-aware scheduling scheme. J Trends Comput Sci Smart Technol (TCSST) 2(3):141–147

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mayank Srivastava .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Srivastava, M., Maurya, A., Sharma, U., Srivastava, S. (2023). Network Monitoring of Cyber Physical System. In: Hemanth, J., Pelusi, D., Chen, J.IZ. (eds) Intelligent Cyber Physical Systems and Internet of Things. ICoICI 2022. Engineering Cyber-Physical Systems and Critical Infrastructures, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-031-18497-0_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-18497-0_51

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-18496-3

  • Online ISBN: 978-3-031-18497-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics