Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(95.28KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Network Security: Experiment of Network Health Analysis At An ISP
Perpetus Jacques Houngbo
Pages - 1 - 10     |    Revised - 31-1-2015     |    Published - 28-2-2015
Published in International Journal of Computer Science and Security (IJCSS)
Volume - 9   Issue - 1    |    Publication Date - January / February 2015  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Network Monitoring, Information Security, Netflow, Nfdump, Nfsen, Worm, Bandwidth, Threat, Bot Botnet, Trojan, Behavior Analysis.
ABSTRACT
This paper presents the findings of an analysis performed at an internet service provider. Based on netflow data collected and analyzed using nfdump, it helped assess how healthy is the network of an Internet Service Providers (ISP). The findings have been instrumental in reflection about reshaping the network architecture. And they have also demonstrated the need for consistent monitoring system.
ABSTRACTING & INDEXING
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
REFERENCES
A. H. M. M. Uddin, “Detecting Botnets Based on their Behaviors Perceived from Netflow Data,” 2009.
C. Gates, J. McNutt, J. B. Kadane, and M. Kellner, “Detecting Scans at the ISP Level,” DTIC Document, 2001.
G. Ollmann, “Botnet communication topologies,” White Pap. Damballa , 2009.
Information Systems Audit and Control Association. ISACA, Cobit 5: A business framework for the governance and management of enterprise IT. Rolling Meadows. IL, 2012.
J. Vania, A. Meniya, and H. Jethva, “Association Rule Based Data Mining Approach to HTTP Botnet Detection,” Sep. 2013.
J. Vykopal, “A Flow-Level Taxonomy and Prevalence of Brute Force Attacks,” in Advances in Computing and Communications , Springer, 2011, pp. 666–675.
J. Vykopal, “Flow-based Intrusion Detection in Large and High-Speed Networks,” PhD thesis, 2010.
K. Singh, R. S. Yadav, and Ranvijay, “A review paper on ad hoc network security,” Int. J. Comput. Sci. Secur. , vol. 1, no. 1, p. 52, 2007.
M. B. R. Ask and H. Skrautvol, “Anomaly Detection and Identification in Feature Based Systems: An Empirical Evaluation,” Norwegian University of Science and Technology, 2011.
M. Campbell, Collecting and Analyzing Flow Data for Large Networks . .
M. Elich, “Flow-based Network Anomaly Detection in the Context of IPv6,” Sep. 2013.
M. Gandhi and S. K. Srivatsa, “Detecting and preventing attacks using network intrusion detection systems,” Int. J. Comput. Sci. Secur. , vol. 2, no. 1, pp. 49–58, 2008.
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network Anomaly Detection: Methods, Systems and Tools,” IEEE Commun. Surv. Tutor. , pp. 1–34, 2013.
namebench - Open-source DNS Benchmark Utility - Google Project Hosting . 2014.
P. Celeda, “Network Security Monitoring and Behavior Analysis,” 2011.
P. Haag, “Watch your Flows with NfSen and NFDUMP,” 2005.
P. Haag, nfdump and NfSen . 2010.
R. Link and D. Sancho, “LESSONS LEARNED WHILE SINKHOLING BOTNETS - NOT AS EASY AS IT LOOKS,” 2013, pp. 106–110.
R. Schoof and R. Koning, “Detecting peer-to-peer botnets,” Univ. Amst. , 2007.
S. H. C. Haris, G. M. Waleed, R. Ahmad, and M. Ghani, “Anomaly detection of IP header threats,” Int. J. Comput. Sci. Secur. , vol. 4, no. 6, p. 497, 2011.
V. Krmí cek and T. Plesník, Detecting Botnets with NetFlow . 2014.
V. Krmicek, “Hardware-Accelerated Anomaly Detection in High-Speed Networks,” Sep. 2013.
Y. Singh, Y. Chaba, and P. Rani, “Integrating–VPN and IDS–An approach to Networks Security,” Int. J. Comput. Sci. Secur. , vol. 1, no. 3, p. 1, 2007.
MANUSCRIPT AUTHORS
Mr. Perpetus Jacques Houngbo
Institut de Mathématiques et de Sciences Physiques (IMSP) - Benin
jacques.houngbo@auriane-etudes.com


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions