Automatic Spotting of Sceptical Activity with Visualization Using Elastic Cluster for Network Traffic in Educational Campus
PDF
PDF

How to Cite

V, Suma. 2020. “Automatic Spotting of Sceptical Activity With Visualization Using Elastic Cluster for Network Traffic in Educational Campus”. Journal of Ubiquitous Computing and Communication Technologies 2 (2): 88-97. https://doi.org/10.36548/jucct.2020.2.004.

Keywords

— Sceptical Activity
— Elastic Cluster
— Automatic Threat Detection
— Network Traffic
— Educational Campus
Published: 27-05-2020

Abstract

An automatic sceptical recognition model to identify the suspicious or the malicious activity in the network of the educational institutional campus is laid out in the paper. The carried out work in the paper kindles the network traffic flow in the educational campus and identifies the unwanted activities and stops them. The detected activities are visualized in the real time using a personalized reportage dash board. The design integrates the open source tools to provide an accurate evaluation utilizing the engine for the identifying and preventing the suspicious activities. The suspicious events identified are computed in the elastic cluster to visualize the intimidations. The laid out model computes the events identified and raises alarms. The elastic cluster founded on the No-SQL reports the happenings occurring in real time. The system is initially allowed to learn the various type of network attacks, once trained it the designed model automatically stops the malicious activities in the network traffic. This enhances the security for the campus networks by utilizing the open source libraries as well as minimizes cost imposed by the commercial identification and the prevention system.

References

  1. Waagsnes, Henrik, and Nils Ulltveit-Moe. "Intrusion Detection System Test Framework for SCADA Systems." In ICISSP, pp. 275-285. 2018.
  2. Khamphakdee, Nattawat, Nunnapus Benjamas, and Saiyan Saiyod. "Improving intrusion detection system based on snort rules for network probe attacks detection with association rules technique of data mining." Journal of ICT Research and Applications 8, no. 3 (2015): 234-250.
  3. Mugunthan, S. R. "Security and Privacy Preserving Of Sensor Data Localization Based On Internet of Things." Journal of ISMAC 1, no. 02 (2019): 81-91.
  4. Mugunthan, S. R. "Soft Computing Based Autonomous Low Rate Ddos Attack Detection and Security For Cloud Computing." Journal of Soft Computing Paradigm (JSCP) 1, no. 02 (2019): 80-90.
  5. Suma, V. "Security and Privacy Mechanism Using Blockchain." Journal of Ubiquitous Computing and Communication Technologies (UCCT) 1, no. 01 (2019): 45-54.
  6. Anguraj, Dinesh Kumar, and S. Smys. "Trust-based intrusion detection and clustering approach for wireless body area networks." Wireless Personal Communications 104, no. 1 (2019): 1-20.
  7. Haoxiang, Wang. "Trust Management of Communication Architectures of Internet of Things." Journal of trends in Computer Science and Smart technology (TCSST) 1, no. 02 (2019): 121-130.
  8. Bhalaji, N. "Efficient and Secure Data Utilization in Mobile Edge Computing By Data Replication." Journal of ISMAC 2, no. 01 (2020): 205-216.
  9. Smys, S. "DDOS Attack Detection In Telecommunication Network Using Machine Learning." Journal of Ubiquitous Computing and Communication Technologies (UCCT) 1, no. 01 (2019): 33-44.
  10. Sathesh, A. "Enhanced Soft Computing Approaches for Intrusion Detection Schemes in Social Media Networks." Journal of Soft Computing Paradigm (JSCP) 1, no. 02 (2019): 69-79.
  11. Bashar, Abul. "Secure And Cost Efficient Implementation Of The Mobile Computing Using Offloading Technique." Journal of Information Technology 1, no. 01 (2019): 48-57.
  12. Francisquelo Tacca, Nicolas Ernesto. "ELK stack Big Data visualitzation using D3 library." Bachelor's thesis, Universitat Politècnica de Catalunya, 2019.
  13. https://www.elastic.co/guide/en/elasticsearch/reference/current/add-elasticsearch-nodes.html
  14. Gormley, Clinton, and Zachary Tong. Elasticsearch: the definitive guide: a distributed real-time search and analytics engine. " O'Reilly Media, Inc.", 2015.
  15. https://dzone.com/articles/elasticsearch-tutorial-creating-an-elasticsearch-c