International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014


Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception

Neelutpol Gogoi | M. N. Sushmitha [2]


Abstract: In the recent time with the increasing rate of data, the security threats on these data have also increased. So, the volume of alerts generated by unified threat manager (UTM) becomes very large. Using conventional methods to analyze a lot of data would drag down the system performance. This paper is a proposal to a system, which will take the UTM logs as the input and analyze these logs using Hadoop Map-Reduce programming mode. Thereby, presenting some threat perceptions by determining the traffic statistics and produce a summarized alarm reports for discovering, predicting and stopping the security threats in the system at a comparatively faster rate. The system would analyze the logs directly at the time of some alerts occurrence and also historical data (logs) from the firewall in order to search for attack signatures (anomaly and patterns) for predicting attacks.


Keywords: Data security, Hadoop, Map-Reduce, Traffic Analysis, Unified threat manager, Zero-day attack


Edition: Volume 3 Issue 3, March 2014,


Pages: 369 - 372


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Neelutpol Gogoi, M. N. Sushmitha, "Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception", International Journal of Science and Research (IJSR), Volume 3 Issue 3, March 2014, pp. 369-372, https://www.ijsr.net/get_abstract.php?paper_id=20131149

Similar Articles with Keyword 'Data security'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela | K Rahul Krishna | Dr. Krishna Kumar P R [2] | Triveni N [2]

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 832 - 839

Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach

Mohammed Saleem Sultan [9] | Mohammed Shahid Sultan [9]

Share this Article
Top