Home   >   CSC-OpenAccess Library   >    Manuscript Information
Network Security: Experiment of Network Health Analysis At An ISP
Perpetus Jacques Houngbo
Pages - 1 - 10     |    Revised - 31-1-2015     |    Published - 28-2-2015
Volume - 9   Issue - 1    |    Publication Date - January / February 2015  Table of Contents
Network Monitoring, Information Security, Netflow, Nfdump, Nfsen, Worm, Bandwidth, Threat, Bot Botnet, Trojan, Behavior Analysis.
This paper presents the findings of an analysis performed at an internet service provider. Based on netflow data collected and analyzed using nfdump, it helped assess how healthy is the network of an Internet Service Providers (ISP). The findings have been instrumental in reflection about reshaping the network architecture. And they have also demonstrated the need for consistent monitoring system.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
A. H. M. M. Uddin, “Detecting Botnets Based on their Behaviors Perceived from Netflow Data,” 2009.
C. Gates, J. McNutt, J. B. Kadane, and M. Kellner, “Detecting Scans at the ISP Level,” DTIC Document, 2001.
G. Ollmann, “Botnet communication topologies,” White Pap. Damballa , 2009.
Information Systems Audit and Control Association. ISACA, Cobit 5: A business framework for the governance and management of enterprise IT. Rolling Meadows. IL, 2012.
J. Vania, A. Meniya, and H. Jethva, “Association Rule Based Data Mining Approach to HTTP Botnet Detection,” Sep. 2013.
J. Vykopal, “A Flow-Level Taxonomy and Prevalence of Brute Force Attacks,” in Advances in Computing and Communications , Springer, 2011, pp. 666–675.
J. Vykopal, “Flow-based Intrusion Detection in Large and High-Speed Networks,” PhD thesis, 2010.
K. Singh, R. S. Yadav, and Ranvijay, “A review paper on ad hoc network security,” Int. J. Comput. Sci. Secur. , vol. 1, no. 1, p. 52, 2007.
M. B. R. Ask and H. Skrautvol, “Anomaly Detection and Identification in Feature Based Systems: An Empirical Evaluation,” Norwegian University of Science and Technology, 2011.
M. Campbell, Collecting and Analyzing Flow Data for Large Networks . .
M. Elich, “Flow-based Network Anomaly Detection in the Context of IPv6,” Sep. 2013.
M. Gandhi and S. K. Srivatsa, “Detecting and preventing attacks using network intrusion detection systems,” Int. J. Comput. Sci. Secur. , vol. 2, no. 1, pp. 49–58, 2008.
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network Anomaly Detection: Methods, Systems and Tools,” IEEE Commun. Surv. Tutor. , pp. 1–34, 2013.
namebench - Open-source DNS Benchmark Utility - Google Project Hosting . 2014.
P. Celeda, “Network Security Monitoring and Behavior Analysis,” 2011.
P. Haag, nfdump and NfSen . 2010.
P. Haag, “Watch your Flows with NfSen and NFDUMP,” 2005.
R. Schoof and R. Koning, “Detecting peer-to-peer botnets,” Univ. Amst. , 2007.
S. H. C. Haris, G. M. Waleed, R. Ahmad, and M. Ghani, “Anomaly detection of IP header threats,” Int. J. Comput. Sci. Secur. , vol. 4, no. 6, p. 497, 2011.
V. Krmicek, “Hardware-Accelerated Anomaly Detection in High-Speed Networks,” Sep. 2013.
V. Krmí cek and T. Plesník, Detecting Botnets with NetFlow . 2014.
Y. Singh, Y. Chaba, and P. Rani, “Integrating–VPN and IDS–An approach to Networks Security,” Int. J. Comput. Sci. Secur. , vol. 1, no. 3, p. 1, 2007.
Mr. Perpetus Jacques Houngbo
Institut de Mathématiques et de Sciences Physiques (IMSP) - Benin