A Novel Framework for Composite Network Security Situation Assessment Using HRCAL Approach
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 5
Abstract
In the present era computer network is taken as the core component of various technology supported areas such as banking sector, emergency systems and communication areas. With this increase in network usage the kind of data protection required to make the system secure is also serving as a challenging task. It includes attack resistant Internet services which results high demand for network analyst which measures the security situations successfully. Existing network analysis tools lacks such capabilities of analyzing the network and access situations correctly. Situation awareness mechanism gathers current network condition and clearly defines the boundaries by which security solutions can be designed effectively. It reflects all the changes made in configurations and methods taken as a security measures by maintaining a database which later on used to make the decisions for network security improvements. It also makes the visualization of attack conditions by making the graphs and plots which greatly improves the rate and the quality measures of persons or machines decision making. This work is going to detect the actual network status by using various metrics of the basis of which accurate decisions can be made. These decisions are used for assessing the current network and status of working devices and let them aware about the network actual conditions. Primarily the HRCAL work is using four categories of metrics like Host, Route, Configuration and Attack Level Analysis.
Authors and Affiliations
Miss. Ankita Patil * ,
A Survey on Various Methodologies of Hiding Association Rules for Privacy Preserving
Data mining is the useful technology to extract information or knowledge from large database. However, misuse of this technology may lead to the disclosure of sensitive information. Privacy preserving data mining...
A REVIEW ON VARIOUS AUDIO STEGANOGRAPHY TECHNIQUES FORAUDIO SIGNALS
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the senderand intended recipient, suspects the existence of the message, a form of security through obscurity. S...
Elimination of Stress and Reduction in Switching Time From Mains to Back-Up Power Source in Power Dependent Public Utilities by Automatic Mains and Phase Changer
Most public utilities depend on electric power to function, so it is paramount that a constant power source is available. These public utilities get their supply from the public mains and in the case where the pub...
Generalized Beta Homeomorphisms in Intuitionistic Fuzzy Topological Spaces
In this paper we introduce the new class of homeomorphisms called generalized beta homeomorphisms in intuitionistic fuzzy topological spaces. We also introduce M-generalized beta homeomorphisms in intuitionistic...
Development of an Web based ERP module for an Educational Institute: A case of Training & Placement (TNP) Cell
This paper deals with the Development of an Web based Enterprise Resource planning (ERP) module for an Educational Institute: A case of Training & Placement (TNP)cell. An ERP system contains various modules in any...