Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(95.28KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Network Security: Experiment of Network Health Analysis At An ISP
Perpetus Jacques Houngbo
Pages - 1 - 10     |    Revised - 31-1-2015     |    Published - 28-2-2015
Volume - 9   Issue - 1    |    Publication Date - January / February 2015  Table of Contents
MORE INFORMATION
KEYWORDS
Network Monitoring, Information Security, Netflow, Nfdump, Nfsen, Worm, Bandwidth, Threat, Bot Botnet, Trojan, Behavior Analysis.
ABSTRACT
This paper presents the findings of an analysis performed at an internet service provider. Based on netflow data collected and analyzed using nfdump, it helped assess how healthy is the network of an Internet Service Providers (ISP). The findings have been instrumental in reflection about reshaping the network architecture. And they have also demonstrated the need for consistent monitoring system.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
1 Information Systems Audit and Control Association. ISACA, Cobit 5: A business framework for the governance and management of enterprise IT. Rolling Meadows. IL, 2012.
2 K. Singh, R. S. Yadav, and Ranvijay, “A review paper on ad hoc network security,” Int. J. Comput. Sci. Secur. , vol. 1, no. 1, p. 52, 2007.
3 C. Gates, J. McNutt, J. B. Kadane, and M. Kellner, “Detecting Scans at the ISP Level,” DTIC Document, 2001.
4 A. H. M. M. Uddin, “Detecting Botnets Based on their Behaviors Perceived from Netflow Data,” 2009.
5 R. Schoof and R. Koning, “Detecting peer-to-peer botnets,” Univ. Amst. , 2007.
6 Y. Singh, Y. Chaba, and P. Rani, “Integrating–VPN and IDS–An approach to Networks Security,” Int. J. Comput. Sci. Secur. , vol. 1, no. 3, p. 1, 2007.
7 M. Gandhi and S. K. Srivatsa, “Detecting and preventing attacks using network intrusion detection systems,” Int. J. Comput. Sci. Secur. , vol. 2, no. 1, pp. 49–58, 2008.
8 J. Vykopal, “Flow-based Intrusion Detection in Large and High-Speed Networks,” PhD thesis, 2010.
9 J. Vykopal, “A Flow-Level Taxonomy and Prevalence of Brute Force Attacks,” in Advances in Computing and Communications , Springer, 2011, pp. 666–675.
10 M. Elich, “Flow-based Network Anomaly Detection in the Context of IPv6,” Sep. 2013.
11 M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network Anomaly Detection: Methods, Systems and Tools,” IEEE Commun. Surv. Tutor. , pp. 1–34, 2013.
12 S. H. C. Haris, G. M. Waleed, R. Ahmad, and M. Ghani, “Anomaly detection of IP header threats,” Int. J. Comput. Sci. Secur. , vol. 4, no. 6, p. 497, 2011.
13 P. Haag, nfdump and NfSen . 2010.
14 P. Haag, “Watch your Flows with NfSen and NFDUMP,” 2005.
15 P. Celeda, “Network Security Monitoring and Behavior Analysis,” 2011.
16 M. B. R. Ask and H. Skrautvol, “Anomaly Detection and Identification in Feature Based Systems: An Empirical Evaluation,” Norwegian University of Science and Technology, 2011.
17 R. Link and D. Sancho, “LESSONS LEARNED WHILE SINKHOLING BOTNETS - NOT AS EASY AS IT LOOKS,” 2013, pp. 106–110.
18 G. Ollmann, “Botnet communication topologies,” White Pap. Damballa , 2009.
19 J. Vania, A. Meniya, and H. Jethva, “Association Rule Based Data Mining Approach to HTTP Botnet Detection,” Sep. 2013.
20 namebench - Open-source DNS Benchmark Utility - Google Project Hosting . 2014.
21 M. Campbell, Collecting and Analyzing Flow Data for Large Networks . .
22 V. Krmicek, “Hardware-Accelerated Anomaly Detection in High-Speed Networks,” Sep. 2013.
23 V. Krmí cek and T. Plesník, Detecting Botnets with NetFlow . 2014.
Mr. Perpetus Jacques Houngbo
Institut de Mathématiques et de Sciences Physiques (IMSP) - Benin
jacques.houngbo@auriane-etudes.com