Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 121 | Weekly Hits: ⮙2

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014

Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception

Neelutpol Gogoi, M. N. Sushmitha

In the recent time with the increasing rate of data, the security threats on these data have also increased. So, the volume of alerts generated by unified threat manager (UTM) becomes very large. Using conventional methods to analyze a lot of data would drag down the system performance. This paper is a proposal to a system, which will take the UTM logs as the input and analyze these logs using Hadoop Map-Reduce programming mode. Thereby, presenting some threat perceptions by determining the traffic statistics and produce a summarized alarm reports for discovering, predicting and stopping the security threats in the system at a comparatively faster rate. The system would analyze the logs directly at the time of some alerts occurrence and also historical data (logs) from the firewall in order to search for attack signatures (anomaly and patterns) for predicting attacks.

Keywords: Data security, Hadoop, Map-Reduce, Traffic Analysis, Unified threat manager, Zero-day attack

Edition: Volume 3 Issue 3, March 2014

Pages: 369 - 372

Share this Article

How to Cite this Article?

Neelutpol Gogoi, M. N. Sushmitha, "Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131149, Volume 3 Issue 3, March 2014, 369 - 372

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Data security'

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Downloads: 101 | Weekly Hits: ⮙4 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1949 - 1953

A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service

Pooja Saini, Kanchan Narula

Share this Article

Downloads: 104 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Downloads: 104 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1696 - 1700

Data Security Policies in Cloud: A Survey

Kasundra Punitkumar R., Shikha J. Pachouly

Share this Article

Downloads: 104 | Weekly Hits: ⮙5 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Similar Articles with Keyword 'Hadoop'

Downloads: 101 | Weekly Hits: ⮙1

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1721 - 1725

Secured Load Rebalancing for Distributed Files System in Cloud

Jayesh D. Kamble, Y. B. Gurav

Share this Article

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2133 - 2136

One Class Clustering Tree for Implementing Many to Many Data Linkage

Ravi R, Michael G

Share this Article

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2241 - 2244

Backup Anomaly Identification with R and Hadoop

Ravindra Phule, Madhav Ingle

Share this Article

Downloads: 104 | Weekly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1482 - 1485

Overview of Big Data

Nivedita Manohar

Share this Article

Downloads: 105 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1249 - 1251

Survey on Resource Allocation in Phase-Level using MapReduce in Hadoop

Suryakant S. Bhalke

Share this Article

Similar Articles with Keyword 'Map-Reduce'

Downloads: 110 | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2247 - 2250

Efficient Query Handling On Big Data in Network Using Pattern Matching Algorithm: A Review

Prasadkumar Kale, Arti Mohanpurkar

Share this Article

Downloads: 112 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2112 - 2115

Approach to Solve NP Complete Problem Using Game Theoretic Scheduling Algorithm and Map-Reduce on Clouds

V. Mogal, Shekhar H. Pingale

Share this Article

Downloads: 114 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 9, September 2019

Pages: 1345 - 1349

An Improved Scheduling Technique based on Containers

Naina Solanki

Share this Article

Downloads: 115 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1174 - 1183

Performance Evaluation of Hadoop Distributed File System and Local File System

Linthala Srinithya, Dr. G. Venkata Rami Reddy

Share this Article

Downloads: 117 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 356 - 357

Fraud Analytics for Wireless Sensor Networks

V. N. Niranjan, K. V. D. Kiran

Share this Article

Similar Articles with Keyword 'Traffic Analysis'

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Downloads: 111 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1996 - 1999

Network Traffic Analysis of Hierarchical Data Using Clustering

Mahaling G. Salimath

Share this Article

Downloads: 116 | Weekly Hits: ⮙5 | Monthly Hits: ⮙14

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2035 - 2040

A Framework for Enhancing Source Location Privacy in Wireless Sensor Networks

Parthasaradhi M, B Nagalakshmi, D Venkatesh

Share this Article

Downloads: 119 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 366 - 371

Mitigating Hotspot Locating Attack in Wireless Sensor Network

Basavarajeshwari, I Manimozhi, M.Jitendranath

Share this Article

Similar Articles with Keyword 'Zero-day attack'

Downloads: 107 | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 873 - 877

Enhanced Training Phase Reduction with Feature Filtering for Malware Detection Using Ensemble SVM

Shital Kuber, Prof. Digambar Padulkar

Share this Article

Downloads: 121 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 369 - 372

Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception

Neelutpol Gogoi, M. N. Sushmitha

Share this Article

Downloads: 138 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 243 - 245

Web-based Honeypot Tool for Website Analysis

Prof. Manoj Dhande, Prashant Patil, Supriya Mhashelkar, Avanti Patil, Shweta Jadhav

Share this Article

Downloads: 139 | Weekly Hits: ⮙1 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 1313 - 1318

Secure: Self-Protection Approach in Cloud Resource Management

Sangeetha G M, Lavanya S, Prashanth

Share this Article



Top