Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122 | Views: 289

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014 | Popularity: 6.6 / 10


     

Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception

Neelutpol Gogoi, M. N. Sushmitha


Abstract: In the recent time with the increasing rate of data, the security threats on these data have also increased. So, the volume of alerts generated by unified threat manager (UTM) becomes very large. Using conventional methods to analyze a lot of data would drag down the system performance. This paper is a proposal to a system, which will take the UTM logs as the input and analyze these logs using Hadoop Map-Reduce programming mode. Thereby, presenting some threat perceptions by determining the traffic statistics and produce a summarized alarm reports for discovering, predicting and stopping the security threats in the system at a comparatively faster rate. The system would analyze the logs directly at the time of some alerts occurrence and also historical data (logs) from the firewall in order to search for attack signatures (anomaly and patterns) for predicting attacks.


Keywords: Data security, Hadoop, Map-Reduce, Traffic Analysis, Unified threat manager, Zero-day attack


Edition: Volume 3 Issue 3, March 2014


Pages: 369 - 372



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Neelutpol Gogoi, M. N. Sushmitha, "Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception", International Journal of Science and Research (IJSR), Volume 3 Issue 3, March 2014, pp. 369-372, https://www.ijsr.net/getabstract.php?paperid=20131149, DOI: https://www.doi.org/10.21275/20131149

Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 832 - 839

Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach

Mohammed Saleem Sultan, Mohammed Shahid Sultan

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 625 - 633

Ridesharing DApps - A Study on Peer-to-Peer Ridesharing on Ethereum

Tushar S Menon, Aviral Srivastava, Aditya, Dr. Radhika K R

Share this Article

Downloads: 4 | Weekly Hits: ⮙3 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 9 Issue 4, April 2020

Pages: 1837 - 1849

Decentralization of Big Data with Blockchain

Venkata Naga Sai Kiran Challa

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 772 - 776

Cryptographic Algorithm to Augment Data Security

Vipin R Bharadwaj, Nalina V, Rithvik Mohan V

Share this Article
Top