An Integrated Model for Monitoring Nodes in Computer Networks
Abstract
Monitoring complex computer network environment is now a very challenging task for network administrators despite the various existing monitoring applications for networks that are faced with the issues of centralized monitoring, which causes network traffic, reduces network bandwidth, and are unable to concurrently run two or more network services. This research paper was designed to tackle the problems exhibited by the existing network monitoring application by integrating different network monitoring services in a single model using the power of agent’s distributed processing and monitoring services. Data about the existing and proposed model was gathered using key informant interview approach, and observation of the existing software. Iterative software model was adopted as the software development life cycle based on its strengths and suitability. The proposed model was developed using use-case and sequence diagrams. Suitable programming languages and development environment such as Java, JavaScript, Hypertext Preprocessor, Hypertext markup language and MySQL were used in coding the software prototype. The functionality of the proposed system was tested and results showed that the proposed system has 100% anomaly network intrusion detection rate and better functional features as compared to the existing network monitoring applications observed.
Downloads
References
T. K. Patil and C. O. Banchhor, “Distributed intrusion detection system using mobile agent in LAN environment,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 4, pp. 1901-1903, 2013.
P. K. Singh, “Introduction to computer networks,” India Enterprises, Ambala City, India, 2011.
O. C. Akinyokun, J. B. Ekuewa and S. A. Arekete, “Development of agent-based system for monitoring software resources in a network environment,” Artificial Intelligence Research, vol. 3, no. 3, pp. 62-74, 2014.
R. Stephen, P. Ray and N. Paramesh, “Network management platform based on mobile agent,” International Journal of Network Management, vol. 14, no. 1, pp. 59 -73, 2003.
M. S. Okundamiya, “Principles of computer and communication networks,” Stemic Publications, Benin City, Nigeria, 2009.
O. Olawale, and M. A. Shafi'i, “E-exams system for Nigerian universities with emphasis on security and result integrity,” In Proceedings of the 7th International Conference on e-learning for knowledge-Based Society, Thailand, pp. 25 – 31, 2010.
S. Abar, S. Konno, and T. Kinoshita, “Autonomous network monitoring system based on agent-mediated network information,” International Journal of Computer Science and Network Security, vol. 8, no. 2, pp. 326 -333, 2008.
A. T. F. Islam, and Taj-Eddin, “A net framework approach for a network monitoring tool,” International Journal of Computer Applications, vol. 55, no. 10, pp. 1 - 14, 2012.
A. Bouloutas, S. Calo, and A. Finkel, “Alarm correction and fault identification in communication networks,” IEEE Transactions on Communications, vol. 42, no. 2, pp. 523 - 534, 1994.
J. Norleyza, and P. Ahmed, “FMS: a computer network fault management system based on the OSI standards,” Malaysian Journal of Computer Science, vol. 11, no. 1, pp. 22-31, 1998.
E. Georgin, F. Bordin, and J. McDonald, “Using prototypes in case-based diagnosis of steam turbines,” IEE Cased-Based Reasoning: Prospects for Applications, vol. 7, no. 2, pp. 20 - 26, 1995.
E. E. Mangina, S. D. J. McArthur, and J. R. McDonald, “Autonomous agents for distributed problem solving in condition monitoring,” Lecture Notes in Artificial Intelligence - Computer Science, pp. 683 - 692, 2000.
S. A. Onashoga, O. B. Ajayi, and A. T. Akinwale, “A simulated multiagent-based architecture for intrusion detection system,” International Journal of Advanced Research in Artificial Intelligence, vol. 2, no. 4, pp. 29 - 38, 2013.
V. K. Chaudhary, and S. K. Upadhyay, “Distributed intrusion detection system using sensor based mobile agent technology,” International Journal of Innovations in Engineering and Technology, vol. 3, no. 1, pp. 220 - 226, 2013.
U. Manzoor, and S. Nefti, “An agent-based system for activity monitoring on network,” Expert Systems with Applications, vol. 36, no. 8, pp. 87 - 94, 2009.
L. Carvalho, and N. D’mello, “Secure network monitoring system using mobile agents,” International Journal of Modern Engineering Research, vol. 3, no. 3, pp. 1850 - 1853, 2013.
P. H. Vishalakshi, “Master subagent-based architecture to monitor and manage nodes in mobile ad-hoc networks,” International Journal of Engineering Research and Applications, vol. 2, no. 3, pp. 1461 - 1465, 2012.
M. Subramanian, “Network monitoring and traffic reduction using multi-agent technology,” International Journal on Advanced Networking and Applications, vol. 6, no. 3, pp. 2342 - 2346, 2014.
P. H., Babar, N. M. Kalekar, N. S. Jadhav, and C. Parireeta, “A novel based intrusion detection system using apriori algorithm,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, no. 3, pp. 3103 - 3108, 2016.
K. Vijay, K. R. Ranjith, M. Saravanan, and D. G. Veni, “Implementation of improved apriori algorithm in internal intrusion detection and prevention system,” International Journal of Future Innovative Science and Engineering Research, vol. 2, no. 1, pp. 48 - 54, 2016.
Copyright (c) 2021 O. J. Okafor, O. C. Nwokonkwo, A. M. John-Otumu
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.