Computer Network Monitoring Based on Iterative Dichotomiser 3 Approach
Main Article Content
Abstract
The Network monitoring is an important part in ensuring computer network security
for protecting network infrastructures. The problem of network system is very hard
on generating the event occurring in a computer network and analyzing them for
signs of anomalous traffic. This paper proposed an efficient technique of network
monitoring system using the Nagios Application with Iterative Dichotomiser 3 (ID3)
for monitoring and alerting of anomaly traffic detection. In addition, we improved
the Multi - Router Traffic Grapher (MRTG) used to report traffic and manage devices
based on the Simple Network Management Protocol (SNMP). As a result, it has shown
that the proposed technique can improve performance of network security and
network management. The Nagios application can produce information that defines
signatures for anomaly detection.
Article Details
References
Imamagic, E. and Dobrenic, D. (2007). Grid Infrastructure Monitoring System Based on Nagios. In Proceeding of the 2007 workshop on Grid monitoring. pp. 23-28 Issariyapat, C. Pongpaibool, P., Mongkolluksame, S. and Meesublak, K. (2012). Using Nagios as a groundwork for developing a better network monitoring system. In Proceeding
of Technology Management for Emerging Technologies. pp. 2771-2777
Katsaros, G., K bert, R. and Gallizo, G. (2011). Building a Service-Oriented Monitoring Framework with REST and Nagios. In Proceeding of IEEE International Conference on Services Computing. pp. 426-431
Katz, G., Shabtai, A., Rokachm, L. and Ofek, N. (2014). A statistical method for improving decision trees. Journal of Computer Science and Technology. Vol. 29. No. 3. pp. 392-407
Li, H. and Zhijian, L. (2010). The Study and Implementation of Mobile GPS Navigation System Based on Google Maps. In Proceeding of the International Conference on Computer and Information Application. pp. 87-90
Murphy, J.W. (2008). SnoScan: An iterative functionality service scanner for large scale networks. Master Thesis, In Graduate school of sciences, Iowa State University: Ames, Iowa, p. 45
Richard Bejtlich. (2005.). The Tao of Network Security Monitoring Beyond Intrusion Detection. Addison Wesley. Pearson Education Inc.
Salvador, E.M. and Granville, L.Z. (2008). Using Visualization Techniques for SNMP Traffic Analyses. In Proceeding of IEEE Symposium on Computers and Communications. pp. 806- 811
Sun, H. (2010). An Integrated Network Performance Monitor System. In Proceeding of the Third International Symposium on Intelligent Information Technology and Security Informatics. pp. 88-91
Suthampan, A., (2005). Privacy Preserving Decision Tree in Multi Party Environment. Master Thesis. In Faculty of Engineering. King Mongkut’s University of Technology Thonburi, County: Thailand - Bangkok
Tran, K.N. and Jin, H. (2010). Detecting Network Anomalies in Mixed-Attribute Data Sets. In Proceeding of the Thied International Conference on Knowledge Discovery and Data Mining. pp. 383-386.
Tubnakog, S., (2007). Risk modeling using decision tree algorithm for voluntar motor insurance. Master Thesis. In Graduate School of sciences, Mae Fah Luang University, County: Thailand-Chiang Rai.
Wei, X., Wu, W. and Liu, Y. (2009). A Network Monitor System Model with Performance Feedback Function. In Proceeding. of International Conference on E-Business and Information System Security. pp. 1- 5
Xing, X. and Mishra, S. (2009). Where is the Tight Link in a Home Wireless Broadband Environment. In Proceeding of IEEE International Symposium on Modeling. Analysis & Simulation of Computer and Telecommunication Systems. pp. 1- 10