Cargando…
Design and Implementation of a Quantitative Network Health Monitoring and Recovery System
A network health monitoring system focuses on the quantification of the network’s health by taking into account various security flaws, leaks, and vulnerabilities. A plethora of propriety tools and patents are available for network health quantification. However, there is a paucity of available rese...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8951673/ https://www.ncbi.nlm.nih.gov/pubmed/35370363 http://dx.doi.org/10.1007/s11277-022-09554-9 |
Sumario: | A network health monitoring system focuses on the quantification of the network’s health by taking into account various security flaws, leaks, and vulnerabilities. A plethora of propriety tools and patents are available for network health quantification. However, there is a paucity of available research and literature in this field. Thus, in this study, we present an architectural design of a network health monitoring system. The design focuses on the quantification of the network health of each end-user as well as the entire network. The network health score for each end-user is quantified by identifying (1) illicit egress-ingress traffic, (2) anomalous fingerprints, and (3) system-network vulnerabilities based on the NVD-CVSS (National Vulnerability Database, Common Vulnerability Severity Score) standards. An overall network-health score is produced, along with a prevention and recovery mechanism that is triggered upon the detection of an anomaly. The proposed system is implemented in a local area network and has demonstrated to protect the network against various threats successfully. The study is concluded by comparing the proposed tool with the popular propriety tools available in the field. The results outline that the proposed system garners features of open-source tools and enriches them by introducing a state-of-the-art architecture coupled with multiple novel features like exhaustive identification of vulnerability and detection of network aberrations using timers. |
---|