Preview

Methodology In Figure 3.1 Essay

Good Essays
Open Document
Open Document
958 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Methodology In Figure 3.1 Essay
The research methodology in Figure 3.1 is based on Yogesh Kumar Singh (2006) book. The first step on doing research is to define the research problem. This is the most crucial step of the research. Then clarifying and stating the problem that delimit the problem from the broad research problem.
Literature review is the next step after the research problem is specified. This review the research that wanted to be conducted with other people’s work that is similar and also specify what makes the research different from the other people’s work. During the literature review, researcher also need to formulate hypothesis.
The hypothesis helps to focus and act as a guidance for the researcher during the research work. Hypothesis functions are to delimit
…show more content…
Data collection which collect specific data to be analyzed to achieve the objective of the research. Then the analysis interprets the data so it has some meaning. Finally, drawing conclusion from the analysis, giving recommendation and writing the research.
The research framework in Figure 3.2 is based on Singh (2006). The data collected from the network through the router. The network data then stored to the storage server and processed to next stage after collecting enough data. During the pre-processing stage, the data are processed by extracting related features and statistically visualized. Finally, the statistical result will be analyzed to summarize and find pattern in the data and evaluated. Flow Chart for this process is shown in Figure 3.3.
The clients connect to the Internet and generate network traffic. This traffic is captured using port mirroring technique. Network traffic that go through the router is port mirrored to a storage server. The storage server stores the DNS traffic and NetFlow traffic from the network. Both of the data is needed because it will be correlated and
…show more content…
The dynamic threshold is also visualized in the line chart. Then, it is used for anomaly detector. Finally, the line chart with dynamic threshold is going to be analyze in the next stage. After the dynamic threshold is calculated, implemented, and visualized, the statistical data is analyzed and evaluated in NetFlow against DNS statistic.
Mean and standard deviation of the feature is needed for dynamic threshold formula. Formula 3.3 is to calculate mean of a feature (x) during the time bin (t) and Formula 3.4 is to calculate standard deviation of a feature (x) during the time bin (t).
The dynamic threshold is calculated using Formula 3.5 for DNS threshold and Formula 3.6 for NetFlow threshold. This threshold is used based on previous paper Amidan et al. (2005) and Oshima et al. (2010). DNS and NetFlow have different formula because of they have different feature. Variable k in the formula is the constant value to fine tuning the threshold sensitivity. In this research one is used for k. Value that outside the mean and the lower or upper bound threshold is determined as

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 7 Exercise 1

    • 489 Words
    • 2 Pages

    Next check the packet delivery ratio, if packet delivery ratio drops to threshold then move to next step. The threshold value is calculated using dynamic threshold algorithm indicated in [3]. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source nodes select one-hop neighbor node nr as the destination and send the RREQ to that node as shown in Fig 2. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also Reply RREP. It indicates that there is Attacker in Reply…

    • 489 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Patton-Fuller Rfp Cmgt554

    • 4696 Words
    • 19 Pages

    Once the network and storage is fully installed and working as specified the next step is to assure that the software and supporting hardware is well suited to display the data to the end users in an easily manageable and highly functional method. Specific methods to deliver data to the end users are discussed and included in the final proposal, including suggestions for Wi-Fi, satellite, WiMax, DSL, cable and how each…

    • 4696 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    Netw420 Week 5

    • 526 Words
    • 3 Pages

    References: * Clemm, A. Network Management Fundamentals Edition 1 (1st ed). Pearson Learning Solutions. Retrieved from http://devry.vitalsource.com/books/9781256084068/id/ch02lev2sec9…

    • 526 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Network Case Flows

    • 689 Words
    • 3 Pages

    The following is a series of case studies on Network Flows. Network flows can be representative of many types of systems. Whether the network is used to transmit data from computer to computer or server to server, transfer goods across the county, or deliver liquid flows to the desired location, networks must be studied to find the most efficient path for the given media to travel across. Locating the most efficient path for media allows systems to run at maximum efficiency without overloading any particular portion of the network, which would slow or even inhibit delivery to the desired destination.…

    • 689 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Once you have select the research method and designed the study, you must have a way to collect the data from the study.…

    • 668 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    * IDS and IPS monitoring of incoming and outgoing network traffic, including anti-virus, anti-spyware and signature and anomaly-based traffic monitors.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Research engages a systematic procedure that focuses on being goal oriented and collecting a ton of data for investigation so the investigator can arrive at a conclusion. This procedure is employed in all research and assessment projects, aside from the research approach (scientific method of inquiry, assessment research, or action study).…

    • 871 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    A literature review is a complete study and understanding of research literature that researchers examine prior or during their research study (Aveyard, 2010).Majid, et al. (2011) looked at a wide range of literature within their research, it is imperative for researchers to look at numerous research related to their research topic to gain an insight on how they conducted their study and the conclusion that was identified from the study (Aveyard, 2010).…

    • 2473 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Quantitative Research

    • 294 Words
    • 1 Page

    11. Data collection is the systematic gathering of information important to the research purpose in which permission must be obtained for the agency where the researcher conducts the study.…

    • 294 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It is meant by analysing of traffic on the internet. Monitoring of the internet is achieved to determine packet volume for network configuration as well as to find out how personnel are spending their time on the internet.…

    • 1121 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Nms Best Practice

    • 8626 Words
    • 35 Pages

    Introduction Network Management Fault Management Network Management Platforms Troubleshooting Infrastructure Fault Detection and Notification Proactive Fault Monitoring and Notification Configuration Management Configuration Standards Configuration File Management Inventory Management Software Management Performance Management Service Level Agreement Performance Monitoring, Measurement, and Reporting Performance Analysis and Tuning Security Management Authentication Authorization Accounting SNMP Security Accounting Management NetFlow Activation and Data Collection Strategy Configure IP Accounting NetPro Discussion Forums − Featured Conversations Related Information…

    • 8626 Words
    • 35 Pages
    Powerful Essays
  • Better Essays

    In Figure 8, we assume the number of the node in a network is 20 network is 20 and each attack need one minute.…

    • 2530 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Nfsen & Nfdump

    • 7934 Words
    • 32 Pages

    The goal of the design is to be able to analyze netflow data from the past as well as to track interesting traffic patterns continuously. The amount of time back in the past is limited only by the disk space available for all the netflow data. The tools are optimized for speed for efficient…

    • 7934 Words
    • 32 Pages
    Satisfactory Essays
  • Good Essays

    Dhcp

    • 3234 Words
    • 13 Pages

    Bibliography: 1. Dynamic Host Configuration Protocol. Wikipedia. [Online] http://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol. 2. DHCP-Dynamic Host Control Protocol. About.com. [Online] http://compnetworking.about.com/cs/protocolsdhcp/g/bldef_dhcp.htm. 3. [Online] http://knowurtech.netfirms.com/networking/how_dhcp_works.html. 4. Kercheval, Berry. DHCP - A Guide to Dynamic TCP/IP Network Configaration. 1999. 5. [Online] http://www.tcpipguide.com/free/t_DHCPGeneralOperationandClientFiniteStateMachine.htm. 6. Gartner. Market Scope for DNS DHCP and IP Address Management. 2009. 7. —. Market Scope for DNS DHCP and IP Management. 2012. 8. BlueCat Network. TYROLIT Delivers Resilient DNS and DHCP with BlueCat Networks; Looks Ahead to IPv6. 2012. 9. [Online] http://www.akibia.com/blog/advances-and-limitations-of-windows-dhcp-dnsservices.…

    • 3234 Words
    • 13 Pages
    Good Essays
  • Satisfactory Essays

    Photoelasticity

    • 257 Words
    • 2 Pages

    Thresholding an image is the process in which the grey-scale image is converted to a binary image based on a specific threshold value. All the pixels having the grey-scale value above the threshold value are converted to white pixels and the ones below to black. Important criteria to determine the threshold value are the fringe contour and fringe thickness. For a high value, we get a very dark image, hence we should optimize the value…

    • 257 Words
    • 2 Pages
    Satisfactory Essays