Performance Evaluation of Composite Network Security Situation Assessment Using HRCAL Approach

Ankita Patil, Vijay Prakash


Internet attacks area unit on the increase and create serious security threats to enterprise networks, industrial websites and to the lots of home web users. Web attacks have become less assailable and complicated with time. Network traffic visualization tools have with successfully enabled security analysts to know the character of traffic gift in a very network. Conversely, these tools believe principally on human experience to get anomalies in traffic and attack patterns. Human capability to grasp large amounts of time-varying data is proscribed and network visualization tools want additional visual aid to extract attention-grabbing patters from such massive and complicated knowledge sets [1]. By visualizing a group of straightforward graph patterns, analysts will place along visual items of knowledge sent by these smaller patterns and might find out about larger and a lot of complicated patterns.Powerful and versatile specification will work on the limitation of un-uniform pattern specification formats existing within the current tools. Therefore, our approach gives way to an iterative visual investigation and allows fast discovery of a lot of subtle attack patterns and abnormal options that area unit otherwise undetectable by normal network traffic visualization tools. [2]

Full Text:



  • There are currently no refbacks.