International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 122 | Views: 134

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014


Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception

Neelutpol Gogoi | M. N. Sushmitha [2]


Abstract: In the recent time with the increasing rate of data, the security threats on these data have also increased. So, the volume of alerts generated by unified threat manager (UTM) becomes very large. Using conventional methods to analyze a lot of data would drag down the system performance. This paper is a proposal to a system, which will take the UTM logs as the input and analyze these logs using Hadoop Map-Reduce programming mode. Thereby, presenting some threat perceptions by determining the traffic statistics and produce a summarized alarm reports for discovering, predicting and stopping the security threats in the system at a comparatively faster rate. The system would analyze the logs directly at the time of some alerts occurrence and also historical data (logs) from the firewall in order to search for attack signatures (anomaly and patterns) for predicting attacks.


Keywords: Data security, Hadoop, Map-Reduce, Traffic Analysis, Unified threat manager, Zero-day attack


Edition: Volume 3 Issue 3, March 2014,


Pages: 369 - 372


How to Download this Article?

Type Your Email Address below to Download the Article PDF


How to Cite this Article?

Neelutpol Gogoi, M. N. Sushmitha, "Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception", International Journal of Science and Research (IJSR), Volume 3 Issue 3, March 2014, pp. 369-372, https://www.ijsr.net/get_abstract.php?paper_id=20131149



Similar Articles with Keyword 'Data security'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 772 - 776

Cryptographic Algorithm to Augment Data Security

Vipin R Bharadwaj | Nalina V | Rithvik Mohan V

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 625 - 633

Ridesharing DApps - A Study on Peer-to-Peer Ridesharing on Ethereum

Tushar S Menon | Aviral Srivastava | Aditya [131] | Dr. Radhika K R

Share this Article



Top