Network level Security visualization is considered to be one of the foremost area where most of the exploration is going on in visualizing the network nature for the systems. Due to vulnerability attacks and projection matrix manipulation, many investigators are directed towards security monitoring measures and preventive techniques against intrusions. There are many major procedures and technological jargons dominating the security related stuffs in the it industry. Many companies are focusing towards projecting their monitoring products in this evolving field. User accessed information such as number packet read and write, Input output response time and delay time were not tracked down. Visualizes all server status and activity and security events with client interaction. Ibm tivoli, spice works, xymon, intermapper are some of the major tools available in the market. Most of the tools picturize by monitoring certain items in the network/server. Network Trace and system activity can be Visualization and security events from the server and the interaction with the client were visualized in the module and also User contexts information were visualized. In this paper, the focused areas include host/server monitoring, internal and external monitoring, port activity and attack patterns. Network tomography is an important area of network measurement, which deals with monitoring the health of various links in a network using end-to-end probes sent by agents located at vantage points in the network/internet.
Network tomography, Vulnerability attacks, and Server monitoring, Visualization and end-to-end probes
M. ASAN NAINAR , V. SANTHANA MARICHAMY , PRASANNA P "Repeat State Inputs In Echo State Networking Environment Through Bash Script Kernel Scanning" Iconic Research And Engineering Journals Volume 2 Issue 11 2019 Page 241-245
M. ASAN NAINAR , V. SANTHANA MARICHAMY , PRASANNA P "Repeat State Inputs In Echo State Networking Environment Through Bash Script Kernel Scanning" Iconic Research And Engineering Journals, 2(11)