Computer Network Monitoring Based on Iterative Dichotomiser 3 Approach

Main Article Content

Prakai Nadee
Chaiwat Dangchuntuk

Abstract

The Network monitoring is an important part in ensuring computer network security
for protecting network infrastructures. The problem of network system is very hard
on generating the event occurring in a computer network and analyzing them for
signs of anomalous traffic. This paper proposed an efficient technique of network
monitoring system using the Nagios Application with Iterative Dichotomiser 3 (ID3)
for monitoring and alerting of anomaly traffic detection. In addition, we improved
the Multi - Router Traffic Grapher (MRTG) used to report traffic and manage devices
based on the Simple Network Management Protocol (SNMP). As a result, it has shown
that the proposed technique can improve performance of network security and
network management. The Nagios application can produce information that defines
signatures for anomaly detection.

Article Details

How to Cite
[1]
P. Nadee and C. Dangchuntuk, “Computer Network Monitoring Based on Iterative Dichotomiser 3 Approach”, RMUTI Journal, vol. 9, no. 2, pp. 25–34, Sep. 2016.
Section
บทความวิจัย (Research article)

References

Bin Mohd Shuhaimi, M.A.A., Binti Roslan, I., Binti Zainal Abidin, Z. and Binti Anawar, S. (2011). The new services in Nagios: Network bandwidth utility, email notification and sms alert in improving the network performance. In Proceeding of 7th International Conference on Information Assurance and Security. pp. 86-91

Imamagic, E. and Dobrenic, D. (2007). Grid Infrastructure Monitoring System Based on Nagios. In Proceeding of the 2007 workshop on Grid monitoring. pp. 23-28 Issariyapat, C. Pongpaibool, P., Mongkolluksame, S. and Meesublak, K. (2012). Using Nagios as a groundwork for developing a better network monitoring system. In Proceeding
of Technology Management for Emerging Technologies. pp. 2771-2777

Katsaros, G., K bert, R. and Gallizo, G. (2011). Building a Service-Oriented Monitoring Framework with REST and Nagios. In Proceeding of IEEE International Conference on Services Computing. pp. 426-431

Katz, G., Shabtai, A., Rokachm, L. and Ofek, N. (2014). A statistical method for improving decision trees. Journal of Computer Science and Technology. Vol. 29. No. 3. pp. 392-407

Li, H. and Zhijian, L. (2010). The Study and Implementation of Mobile GPS Navigation System Based on Google Maps. In Proceeding of the International Conference on Computer and Information Application. pp. 87-90

Murphy, J.W. (2008). SnoScan: An iterative functionality service scanner for large scale networks. Master Thesis, In Graduate school of sciences, Iowa State University: Ames, Iowa, p. 45

Richard Bejtlich. (2005.). The Tao of Network Security Monitoring Beyond Intrusion Detection. Addison Wesley. Pearson Education Inc.

Salvador, E.M. and Granville, L.Z. (2008). Using Visualization Techniques for SNMP Traffic Analyses. In Proceeding of IEEE Symposium on Computers and Communications. pp. 806- 811

Sun, H. (2010). An Integrated Network Performance Monitor System. In Proceeding of the Third International Symposium on Intelligent Information Technology and Security Informatics. pp. 88-91

Suthampan, A., (2005). Privacy Preserving Decision Tree in Multi Party Environment. Master Thesis. In Faculty of Engineering. King Mongkut’s University of Technology Thonburi, County: Thailand - Bangkok

Tran, K.N. and Jin, H. (2010). Detecting Network Anomalies in Mixed-Attribute Data Sets. In Proceeding of the Thied International Conference on Knowledge Discovery and Data Mining. pp. 383-386.

Tubnakog, S., (2007). Risk modeling using decision tree algorithm for voluntar motor insurance. Master Thesis. In Graduate School of sciences, Mae Fah Luang University, County: Thailand-Chiang Rai.

Wei, X., Wu, W. and Liu, Y. (2009). A Network Monitor System Model with Performance Feedback Function. In Proceeding. of International Conference on E-Business and Information System Security. pp. 1- 5

Xing, X. and Mishra, S. (2009). Where is the Tight Link in a Home Wireless Broadband Environment. In Proceeding of IEEE International Symposium on Modeling. Analysis & Simulation of Computer and Telecommunication Systems. pp. 1- 10