an analysis on bandwidth utilization and traffic pattern for network

advertisement
AN ANALYSIS ON BANDWIDTH
UTILIZATION AND TRAFFIC
PATTERN FOR NETWORK
SECURITY MANAGEMENT
1
1
Khushbookumari1, Navotna2
Student of information technology, UPTU
2
Student of information technology, UPTU
Khushbookumari845@gmail.com, 2navotna845@gmail.com
This paper presented an analysis on
network bandwidth utilizations and traffic
pattern in an organization. It presents pattern of
network traffic, used of bandwidth utilization
and network trends properties. Internet traffics
are analyzed and the traffic pattern behavior is
identified. Network Protocol Analyzer is used as
a centre agent and has been setup and plug at
the main entrance of internet traffic flow from
outside world into the inside network of the
organization. Valuable information such as
traffic pattern on category trends, protocols
trends, internet traffic and bandwidth used is
captured. Then all traffics flow from the internet
to the inside network is filtered according to the
identified policies. Both traffic filtered and
unfiltered traffic then are compared and
analyzed in bandwidth throughput, category
trends, protocols trend, risk class trends and
type of internet applications used. This research
has successfully gathered and analyzed the
traffic flows, identified the network trends and
bandwidth utilization. Bandwidth shaping also
has been successfully done in prioritizing the
applications used.
ABSTRACT-
Keywords: Bandwidth Utilization, Traffic Pattern,
Security, Network Agent, Network Management,
Bandwidth Performance.
1. INTRODUCTION
Network performance is one of the important
issues today in computer engineering applications
and systems mainly in Network Management.
Network performance analysis efforts would really
help the computer network engineers in order to
offer better services and excellent supervision in
Network Management administrations. This project
scope involves running a fluke tools as an agent
scanning the network traffic that sits on a network.
The process of identifications and defining traps on
network attack will be delivered that calls policy
implemented. This policy was tap to the tools or
agent to capture the network traffic on bandwidth
and protocols that risk the network for security
purposes. This presented pattern of network traffic
used and bandwidth utilization performance base on
the filtered trends. Statistics of all indentified
captured risk and policies are tabulated. The
captured data then are analyzes on the bandwidth
utilization. This paper would help the network
administrator or manager to improve the network
performance and overcome the issue of network
bandwidth usage as ports scanning, peer to peer
applications is mostly used. This research has
successfully gathered and analyzed the traffic
flows, identified the network trends and bandwidth
utilization. Bandwidth shaping also has been
successfully done in prioritizing the applications
used.
NETWORK TRAFFIC PATTERN AND INTRUSION
SCENARIO
Manage network traffic and it performances turns to
be a critical problem in network management in
today’s world. Therefore much progress is being
made to protect internet and intranet, such as the
firewall and intrusion detection system on the
network traffic that can cause worm in the network.
Unfortunately the capacity of these solutions is very
limited where evidence that network attacks occur
cannot be provided .Much effort has been spent on
designing more effective traffic mechanisms,
building better defense measures, and generating
vulnerability-specific remedies. Due to this reason,
research on analyze the network pattern in
delivering the better network performance and
management. A network that has been prepared for
forensic analysis is easy to monitor, security
vulnerabilities and configuration problems can be
conveniently identified. It also allows the best
possible analysis of security violations. Considering
the network implementations policy and where is
the interest to analyze the traffic is important. A
focus to monitor the external accessible servers
point on the external demilitarized zone (DMZ) in
the network is crucial. There are primary evidence
and secondary evidence. Primary evidence refers to
information that directly indicates attacks or
security policy violations. Secondary evidence
refers to information that does not directly represent
attacks but could provide complementary
information for investigation. Secondary evidence
comes from extensive sources and in a much higher
volume. Generally, primary evidence is the starting
Point of forensic investigation and provides the
basis for searches towards secondary evidence.
Querying the secondary evidence usually has two
objectives: to discover hidden suspicious events and
to evaluate the trustworthiness of primary evidence.
In their current prototype, they have used network
Intruder Detections Systems (IDS) alerts as the
primary evidence. They also captured raw network
flow logs and host logs that are used as secondary
Evidence. Network analysis framework presented
based on the distributed techniques which providing
an integrated platform for automatic analysis
evidence collection and efficient data storage.
DATA COLLECTION AND METHOD
This research present the method similar to
forensics network in forensic system architecture
but the agent are placed at the one core centre from
the internet to the inside network.
More data on bandwidth are presented because this
forensic try to details in one of the worms attacks
are on the bandwidth used on the network such as
the Denial of Services (DOS) attacks. There are two
type of filtering policy done for the capture traffic
such as default filtering where Network analyzer is
setup with Global policy applied to collect the raw
data went through from the internet to inside
network. The second one is called Customize
Filtering.
Customized policies are defined in different levels
of access of the internet users.
RESULT AND CONCLUSION
The comparison of protocol use on bandwidth
usage has been analyzed on the findings gathered
in 10 days time between filtered and unfiltered data.
It shows the difference gathered of bandwidth
differences and increment between filtered and
unfiltered task.
After filtered has been done on prioritized protocols
then bandwidth were filtered based on the identified
protocols. The data on risk class on filtered and
unfiltered implementation has been compared. The
risk class factors are productivity loss, Business
usage, Network Bandwidth loss, security risk and
legal liability. Network bandwidth loss uses most
bandwidth with 89% and productivity loss also uses
second most bandwidth with 83%.Security Risk
also has presented a high bandwidth loss. This
shows that, there are facts that the network is being
attack on the bandwidth usage.
Fig:-Filtered at on the core center from internet
to the inside network
CAPTURED TRAFFIC AND ANALYSIS DATA
All captured of the raw and filtered is presented and
analyzed in this section. Category trend is the
bandwidth utilization of internet traffic collected by
category. Data on the Category on
Bandwidth utilization of internet traffic has been
captured in 20 days. Protocol trend is the
collections of Bandwidth utilization on internet
traffic that are filtered by Protocol. Certain
protocols that are filtered are known to users to do
such a non-productive work or malicious work
while they are surfing to the internet.
Fig 2:-Bandwidth difference between protocols
REFERENCES
[1] The IEEE website. [Online] Available: http://www.ieee.org/
[2]WWW.engpaper.com/network-security-research-paper-22.htm
[3]Tannenbaum “Computer network” book
Download