Algorithm for Intelligent Network Visualization and Threat Analysis

International Journal of Computer Trends and Technology (IJCTT)          
© March to April Issue 2011 by IJCTT Journal
Volume-1 Issue-1                          
Year of Publication : 2011
Authors :Amit Kumar, Prashant Sharma, Dr. Shishir Kumar.


Amit Kumar, Prashant Sharma, Dr. Shishir Kumar. "Algorithm for Intelligent Network Visualization and Threat Analysis"International Journal of Computer Trends and Technology (IJCTT),V1(1):17-22 March to April Issue 2011 .ISSN Published by Seventh Sense Research Group.

Abstract—Network security is an intriguing field which perplexes many and escapes more. Unfortunately, the issues surrounding network security are not such that we can afford for people either to ignore or to disregard policy and precautions put in place to protect users of a computer network. Network security is a difficult problem. As time progresses, user-bases increase dramatically and with them they bring application diversity and a larger variation in knowledge. Professionals in the I.T. industry are as guilty of ignorance as young children or the elderly when it comes to threats to security posed by networks. While it is commonplace for new users of Microsoft Windows to learn where to adjust screen settings or how to install a printer on their computers from the „Getting Started Tour?, there is no manual, memo or video distributed to new users of computer systems to teach them of the dangers of networks and network-powered applications. System administrators constantly run up against conflicts of interest between good business and good security and more often than not, avoiding disruption to or complication of the business triumphs over implementing secure policies. It is this behavior that makes it so important that users are well informed and take responsibility for their actions. This paper is concerned with development of application that helps user to visualize their network and analyze the serious threats. Our application serves as an attempt to provide an intuitive application to visualize threat that exit when ever user logon to computer attached to any network.


[1] [BAC99] Bace, Rebecca, "An Introduction to Intrusion Detection and Assessment: for System and Network Security Management," ICSA White Paper, 1998.[6] Computer Networks, Fourth Edition by Andrew S. Tanenbaum (Prentice Hall PTR), Vrije Universiteit, Amsterdam, The Netherlands
[2] Data Communications and Networking, Fourth Edition by Behrouz A Forouzan
[3] Software Engineering – A Practitioner?s Guide, Sixth Edition by Roger S. Pressman ( McGraw –Hill International Edition )
[4] D. Comer (Ed.), Internetworking with TCP/IP: Principles, Protocols and Architecture, Prentice-Hall, Upper Saddle River, New Jersey, 1991.
[5] D. Denning, Information Warfare and Security, Addison Wesley, Reading, Massachusetts, 1999.
[6] M. Allman, “A Web Server?s View of the Transport Layer,” Computer Communication Review, 30(5), Oct. 2000.
[7] H. Balakrishnan, S. Seshan, M. Stemm, and R. Katz, “Analyzing Stability in Wide-Area Network Performance,” In Proc. ACM SIGMETRICS? 97,June 1997.
[8] M. Crovella and A. Bestavros, “Self-similarity in World Wide Web Traffic: Evidence and Possible Causes,” IEEE/ACM Transactions on Networking, 5(6):835-846, December, 1997.
[9] C. Cranor, T. Johnson, V. Shkapenyuk, and O. Spatschek. Gigascope: High performance network monitoring with a SQL interface. Sigmod 2002 demonstration, 2002.
[10] R. Buyya. PARMON: a portable and scalable monitoring system for clusters. Software - Practice and Experience, 30(7):723–739, 2000.
[11] D. Carney, U. Cetintemel, A. Rasin, S. B. Zdonik, M. Cherniack, and M. Stonebraker. Operator scheduling in a data stream manager. In VLDB, 2003.

Keywords— Threat, security, monitoring, packet, port.