IJSRSET151575 | Received: 16 October 2015 | Accepted: 26 October 2015 | September-October 2015 [(1)5: 375-382]
© 2015 IJSRSET | Volume 1 | Issue 5 | Print ISSN : 2395-1990 | Online ISSN : 2394-4099
Themed Section: Science and Technology
375
A Study on Monitoring of Visitors in Dynamic Network
Dr. M. Sivasakthi
1
, M. Nester Jeyakumar
2
1
Asst. Professor & Head, Department of MCA, MASS College of Arts and Science, Chennai, Tamilnadu, India
2
Asst. Professor, Department of Computer Science, Loyola College, Chennai, Tamilnadu, India
ABSTRACT
Wireless Network is very broad area, which include set of nodes those communicate through radio waves.
Dynamics and Portability are important aspect of Wireless Network. In this paper we present a monitoring system
for a dynamic network, in which a set of domain nodes shares the responsibility for producing and storing
monitoring information about a set of visitors. This information is stored persistently when the set of domain nodes
grows and shrinks. Such a system can be used to store traffic or other logs for auditing, or can be used as a
subroutine for many applications to allow significant increases in functionality and reliability. The features of the
system include authenticating visitors, monitoring their traffic through the domain, and storing this information in a
persistent, efficient, and searchable manner. From a theoretical outlook our system performs fighting fit, but it
would certainly be interesting to see how it would perform in real life.
Keywords: Survivable Monitoring, Network Intrusion Detection, Emergency Communication
I. INTRODUCTION
In dynamic network, network configuration being
rearranged at every time when subscriber moves into
different base station. Dynamic overlay networks have
recently attracted a lot of attention due to the enormous
interest in peer-to-peer systems and wireless ad-hoc
networks.
We present a monitoring system which collects and
stores information about visiting participants in a
network. The information is made available upon
request and can be subsequently analyzed and used for
any purpose by an administrator. Methods for
authentication ensure that visitor nodes are identified
before being allowed to communicate; message
encryption within the network ensures that no node can
impersonate a domain node or send messages through
the domain nodes except through the proper monitoring
process.
Depending on how the information collected by the
system and it is being used, there are several
applications such as persistent audit logs, network
intrusion detection, and emergency systems.
1.1 Problem description
We assume that there is two different kinds of nodes,
visitors and domain nodes, and that the visitors are
untrusted and the domain nodes are trusted. The task of
the domain nodes is to monitor all activities of the
visitors which involve the network. They also store a
distributed database containing recorded monitoring
information for all visitors. There are three components
to this monitoring process:
Traffic of the visitors has to be cached.
The intercepted traffic must be processed to
produce relevant monitoring information.
This information must be stored permanently.
We focus primarily on the last of these, studying
a distributed database and algorithms for the
storage of this information. The requirements of
such a database are as follows:
Authentication: The system must be able to identify
visitors accurately to ensure that stored information can
be correctly matched to a visitor.
Search ability: The database must be searchable, in the
sense that an administrator must be able to acquire all