Skip to main content
Top

2023 | OriginalPaper | Chapter

Network Monitoring of Cyber Physical System

Authors : Mayank Srivastava, Aman Maurya, Utkarsh Sharma, Shikha Srivastava

Published in: Intelligent Cyber Physical Systems and Internet of Things

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the field of network and server security, every organization, no matter how big or small, has to adapt different monitoring techniques in relation with the servers and networks. Server attacks are a major threat in today’s world if the systems and networks and the host servers are vulnerable. Network and server monitors or administrators have to keep an eye over different tools for different purposes. Therefore, this paper offers a methodology with the help of which we propose to develop a tool that would ease up the work of server administrators. This tool would provide all the services that multiple other tools provide. This would help enhance the monitoring section of the web servers in particular by using different tools and modules with the help of python. This paper also explains and concludes that the tool being developed would be effective and efficient, and therefore save a lot of time and ensures security from threats related to servers.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zeng W, Wang Y (2009) Design and implementation of server monitoring system based on SNMP. In: IEEE international joint conference on artificial intelligence, vol 3, pp 857–860 Zeng W, Wang Y (2009) Design and implementation of server monitoring system based on SNMP. In: IEEE international joint conference on artificial intelligence, vol 3, pp 857–860
2.
go back to reference Roblee C, Berk V (2005) Implementing large-scale autonomic server monitoring using process query systems. In: IEEE proceedings of the second international conference on autonomic computing, pp 123–133 Roblee C, Berk V (2005) Implementing large-scale autonomic server monitoring using process query systems. In: IEEE proceedings of the second international conference on autonomic computing, pp 123–133
3.
go back to reference Yucheng L, Yubin L (2010) A monitoring system design program based on B/S mode. In: IEEE international conference on intelligent computation technology and automation, pp 184–187 Yucheng L, Yubin L (2010) A monitoring system design program based on B/S mode. In: IEEE international conference on intelligent computation technology and automation, pp 184–187
4.
go back to reference Forrest S, Hoffmeyr S, Somayaji A, Longstaff T (1996) A sense of self for unix processes. In: IEEE symposium on security and privacy, pp 120–128 Forrest S, Hoffmeyr S, Somayaji A, Longstaff T (1996) A sense of self for unix processes. In: IEEE symposium on security and privacy, pp 120–128
5.
go back to reference Nemeth E, Snyder G, Seebass S, Hein TR (1995) UNIX system administration handbook. Prentice Hall Nemeth E, Snyder G, Seebass S, Hein TR (1995) UNIX system administration handbook. Prentice Hall
6.
go back to reference Bohra A, Neantiu I, Gallard P, Sultan E, Iftode L (2004) Remote repair of operating system state using Backdoor. In: IEEE proceeding of the international conference on autonomic computing, pp 256–263 Bohra A, Neantiu I, Gallard P, Sultan E, Iftode L (2004) Remote repair of operating system state using Backdoor. In: IEEE proceeding of the international conference on autonomic computing, pp 256–263
7.
go back to reference Kephart JO (2005) Research challenges of autonomic computing. In: Proceedings of the 27th international conference on Software engineering, IBM Thomas J. Watson Research Center, USA Kephart JO (2005) Research challenges of autonomic computing. In: Proceedings of the 27th international conference on Software engineering, IBM Thomas J. Watson Research Center, USA
8.
go back to reference Tsoa FP, Jouet S, Pezaros DP (2016) Network and server resource management strategies for data centre infrastructures: a survey. Comput Netw 106:209–225 Tsoa FP, Jouet S, Pezaros DP (2016) Network and server resource management strategies for data centre infrastructures: a survey. Comput Netw 106:209–225
9.
go back to reference Thirukonda MM, Becker SA (2002) WebSpy: an architecture for monitoring web server availability in a multi-platform environment. Technical report CS-2002-07, Computer Science Department, Florida Institute of Technology Thirukonda MM, Becker SA (2002) WebSpy: an architecture for monitoring web server availability in a multi-platform environment. Technical report CS-2002-07, Computer Science Department, Florida Institute of Technology
10.
go back to reference Sihyung L, Kyriaki L, Hyong SK (2014) Network monitoring: present and future. Comput Netw 65:84–98 Sihyung L, Kyriaki L, Hyong SK (2014) Network monitoring: present and future. Comput Netw 65:84–98
11.
go back to reference Suri S, Batra V (2010) Comparative study of network monitoring tools. Int J Innovative Technol Exploring Eng (IJITEE) 1(3):63–65 Suri S, Batra V (2010) Comparative study of network monitoring tools. Int J Innovative Technol Exploring Eng (IJITEE) 1(3):63–65
12.
go back to reference Trimintzios P, Polychronakis M, Papadogiannakis A, Foukarakis M, Markatos EP, Oslebo A (2006) DiMAPI: an application programming interface for distributed network monitoring. In: Conference on network operations and management symposium, pp 382–439 Trimintzios P, Polychronakis M, Papadogiannakis A, Foukarakis M, Markatos EP, Oslebo A (2006) DiMAPI: an application programming interface for distributed network monitoring. In: Conference on network operations and management symposium, pp 382–439
13.
go back to reference Fang W, Zhijin Z, Xueyi Y (2008) A new dynamic network monitoring based on IA. In: IEEE international symposium on computer science and computational technology. IEEE, pp 637–640 Fang W, Zhijin Z, Xueyi Y (2008) A new dynamic network monitoring based on IA. In: IEEE international symposium on computer science and computational technology. IEEE, pp 637–640
14.
go back to reference Bonelli N, Giordano S (2016) Network traffic processing with PFQ. IEEE J Sel Areas Commun 34(6):1819–1833CrossRef Bonelli N, Giordano S (2016) Network traffic processing with PFQ. IEEE J Sel Areas Commun 34(6):1819–1833CrossRef
15.
go back to reference Bashar A, Smys S (2021) Physical layer protection against sensor eavesdropper channels in wireless sensor networks. IRO J Sustain Wirel Syst 3(2):59–67 Bashar A, Smys S (2021) Physical layer protection against sensor eavesdropper channels in wireless sensor networks. IRO J Sustain Wirel Syst 3(2):59–67
16.
go back to reference Haoxiang W, Smys S (2020) Secure and optimized cloud-based cyber-physical systems with memory-aware scheduling scheme. J Trends Comput Sci Smart Technol (TCSST) 2(3):141–147CrossRef Haoxiang W, Smys S (2020) Secure and optimized cloud-based cyber-physical systems with memory-aware scheduling scheme. J Trends Comput Sci Smart Technol (TCSST) 2(3):141–147CrossRef
Metadata
Title
Network Monitoring of Cyber Physical System
Authors
Mayank Srivastava
Aman Maurya
Utkarsh Sharma
Shikha Srivastava
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-18497-0_51

Premium Partner