A New Approach to Monitor Network

  • Hemant Kumar Saini
  • Anurag Jagetiya
  • Kailash Kumar
  • Satpal Singh Kushwaha
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 248)

Abstract

Network-based attacks have become common and intervened. For this reason, detecting systems are now shifting their focus from host to network. Skimmers routinely perform “portscans” to search the vulnerable servers to intervene. Network Intrusion Detection Systems (NIDS) try to detect such behavior and flag them as malicious. An important requirement in such systems is instant response: the faster a NIDS detects malice, the lesser would be the resulting damage. At the same time, NIDS should not pseudo implicate the remote hosts as malicious. Balancing the promptness and accuracy in identifying malicious activity is a delicate and typical task. We develop detection system. TanceQi is a design which determines unfaithful processes and malicious services into our network in a fast and significant manner without having any tracking in route. This simplifies the work of admin and also performs monitoring faster and more accurately than the other than other current solutions.

Keywords

Security Network NetSTAT LAN NIDS ethtool iptraf netperf grep 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Surveying Port Scans and Their  Detection Methodologies. Comput. J. 54(10), 1565–1581 (2011)CrossRefGoogle Scholar
  2. 2.
    Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network Intrusion Detection. IEEE Network, 26–41 (May/June 1994)Google Scholar
  3. 3.
    Iglun, K., Kemmerer, R.A., Porras, P.A.: State Transition Analysis: A Rule-Based Intrusion detection System. IEEE Transactions on software Engineering 21(3) (March 1995)Google Scholar
  4. 4.
    Vigna, G., Kemmerer, R.A.: NetSTAT: A Network-Based Intrusion Detection Approach. In Proceedings. In: Proceedings of the 14th Annual Computer Security Applications Conference, ACSAC 1998, p. 25. IEEE Computer Society, Washington, DC (1998)Google Scholar
  5. 5.
    Gadge, J., Patil, A.A.: Port scan detection. In: 16th IEEE International Conference on Networks, pp. 1–6. ICON (2008)Google Scholar
  6. 6.
    Kocher, J.E., Gilliam, D.P.: Self port scanning tool: providing a more secure computing environment through the use of proactive port scanning. In: 14th IEEE International Workshops on Enabling Technologies Infrastructure for Collaborative Enterprise, June 13-15, pp. 139–143 (2005)Google Scholar
  7. 7.
    Nmap - Free Security Scanner For Network Exploration & Security Audits, http://nmap.org/
  8. 8.
    Mallissery, S., Prabhu, J., Ganiga, R.: Survey on Intrusion detection Methods. In: 3rd International Conference on Advances in Recent Technologies in Communication and Computing, November 14-15, pp. 224–228 (2011)Google Scholar
  9. 9.
    Gupta, S.: Logging and Monitoring to Detect Network Intrusions and Compliance Vs in the Environment, Secunia’s Yearly Report 2010 (July 4, 2012)Google Scholar
  10. 10.
    Levine, J.G., Grizzard, J.B., Owen, H.L.: Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. IEEE Security and Privacy 4(1), 24–32 (2006)CrossRefGoogle Scholar
  11. 11.
    Aubert, S.: rkscan: Rootkit Scanner (2004), http://www.hsc.fr/ressources/outils/rkscan/
  12. 12.
    Dialog: An Introductory Tutorial, http://www.linuxjournal.com/article/2807
  13. 13.
  14. 14.
  15. 15.
    Srivastava, R., Richhariya, V.: Survey of Current Network Intrusion Detection Techniques. Journal of Information Engineering and Applications 3(6) (2013) ISSN 2224-5782Google Scholar
  16. 16.
    Sonawane, S., Pardeshi, S., Prasad, G.: A survey on intrusion detection techniques. In: Proceedings of National Conference on Emerging Trends in Information Technology, vol. 2(3), pp. 127–133 (2012); World Journal of Science and TechnologyGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Hemant Kumar Saini
    • 1
  • Anurag Jagetiya
    • 2
  • Kailash Kumar
    • 3
  • Satpal Singh Kushwaha
    • 3
  1. 1.Department of CSERTURajasthanIndia
  2. 2.MLV Govt. Textile & Engineering CollegeBhilwara RajasthanIndia
  3. 3.Department of CSEMITRCAlwar RajasthanIndia

Personalised recommendations