Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014

Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception

Neelutpol Gogoi, M. N. Sushmitha

In the recent time with the increasing rate of data, the security threats on these data have also increased. So, the volume of alerts generated by unified threat manager (UTM) becomes very large. Using conventional methods to analyze a lot of data would drag down the system performance. This paper is a proposal to a system, which will take the UTM logs as the input and analyze these logs using Hadoop Map-Reduce programming mode. Thereby, presenting some threat perceptions by determining the traffic statistics and produce a summarized alarm reports for discovering, predicting and stopping the security threats in the system at a comparatively faster rate. The system would analyze the logs directly at the time of some alerts occurrence and also historical data (logs) from the firewall in order to search for attack signatures (anomaly and patterns) for predicting attacks.

Keywords: Data security, Hadoop, Map-Reduce, Traffic Analysis, Unified threat manager, Zero-day attack

Edition: Volume 3 Issue 3, March 2014

Pages: 369 - 372

Share this Article

How to Cite this Article?

Neelutpol Gogoi, M. N. Sushmitha, "Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131149, Volume 3 Issue 3, March 2014, 369 - 372

117 PDF Views | 108 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data security'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1363 - 1366

Internet of Things & Creation of the Fifth V of Big Data

Shaurya Shekhar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1912 - 1916

Survey on Privacy Preserving and Data Security Techniques

Pramila Kharat, Amar Buchade

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1949 - 1953

A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service

Pooja Saini, Kanchan Narula

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1345 - 1350

Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks

Kapilesh S. Swami, Dr. P Sai Kiran

Share this Article

Similar Articles with Keyword 'Hadoop'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1096 - 1101

Parallel Data Shuffling for Hadoop Acceleration with Network Levitated Merge and RDMA for Interconnectivity

Kishorkumar Shinde, Venkatesan N.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1646 - 1650

Performance Analysis of Multi-Node Hadoop Clusters using Amazon EC2 Instances

Ruchi Mittal, Ruhi Bagga

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1103 - 1108

Design of a High Performing Cloud Using Load Rebalancing Technique in Distributed File System

Y. Steeven, C. Prakasha Rao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2241 - 2244

Backup Anomaly Identification with R and Hadoop

Ravindra Phule, Madhav Ingle

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2837 - 2842

Challenges for HDFS to Read and Write Using Different Technologies

Sunil Kumar S, Sanjeev G Kanabargi

Share this Article

Similar Articles with Keyword 'Map-Reduce'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2112 - 2115

Approach to Solve NP Complete Problem Using Game Theoretic Scheduling Algorithm and Map-Reduce on Clouds

V. Mogal, Shekhar H. Pingale

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 356 - 357

Fraud Analytics for Wireless Sensor Networks

V. N. Niranjan, K. V. D. Kiran

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2247 - 2250

Efficient Query Handling On Big Data in Network Using Pattern Matching Algorithm: A Review

Prasadkumar Kale, Arti Mohanpurkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 585 - 590

Survey Paper on Big Data Processing and Hadoop Components

Poonam S. Patil, Rajesh. N. Phursule

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1174 - 1183

Performance Evaluation of Hadoop Distributed File System and Local File System

Linthala Srinithya, Dr. G. Venkata Rami Reddy

Share this Article

Similar Articles with Keyword 'Traffic Analysis'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1996 - 1999

Network Traffic Analysis of Hierarchical Data Using Clustering

Mahaling G. Salimath

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2035 - 2040

A Framework for Enhancing Source Location Privacy in Wireless Sensor Networks

Parthasaradhi M, B Nagalakshmi, D Venkatesh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 366 - 371

Mitigating Hotspot Locating Attack in Wireless Sensor Network

Basavarajeshwari, I Manimozhi, M.Jitendranath

Share this Article

Similar Articles with Keyword 'Zero-day attack'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 873 - 877

Enhanced Training Phase Reduction with Feature Filtering for Malware Detection Using Ensemble SVM

Shital Kuber, Prof. Digambar Padulkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 369 - 372

Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception

Neelutpol Gogoi, M. N. Sushmitha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 243 - 245

Web-based Honeypot Tool for Website Analysis

Prof. Manoj Dhande, Prashant Patil, Supriya Mhashelkar, Avanti Patil, Shweta Jadhav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 1313 - 1318

Secure: Self-Protection Approach in Cloud Resource Management

Sangeetha G M, Lavanya S, Prashanth

Share this Article
Top