Securing and Monitoring of Bandwidth Usage in Multi-Agents Denial of Service Environment
The primary purpose of Denial of Service attack (DoS) is to cripple resources so that the resources are made unavailable to the legitimate users. Due to the inadequate monitoring of activities on the network, it has resulted into huge financial losses. Bandwidth which is one of the resources being u...
Gespeichert in:
Veröffentlicht in: | International journal of advanced computer science & applications 2018, Vol.9 (9) |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 9 |
container_start_page | |
container_title | International journal of advanced computer science & applications |
container_volume | 9 |
creator | O., Ogunleye G. S.G, Fashoto Elliot, Mbunge S.A, Arekete T.O., Ojewumi |
description | The primary purpose of Denial of Service attack (DoS) is to cripple resources so that the resources are made unavailable to the legitimate users. Due to the inadequate monitoring of activities on the network, it has resulted into huge financial losses. Bandwidth which is one of the resources being used on the network, if not properly monitored could result into misused and attack. This paper proposes a real time system for securing and monitoring the amount of bandwidth consumed on the network using the multi-agent framework technology. It also keeps a record of internet protocol (IP) addresses visiting the network and may be used as a starting point for the aspect of response in providing a comprehensive solution to DoS attacks. The bandwidth is pre-entered and an agent is assigned to monitor bandwidth consumption rate against the set threshold. If the bandwidth is consumed above the bandwidth limit and time set, then a DoS attack is suspected taking into considerations the DoS attack framework. This framework can be used as a replicate of what happen in the network scenario environment. |
doi_str_mv | 10.14569/IJACSA.2018.090955 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2656407148</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2656407148</sourcerecordid><originalsourceid>FETCH-LOGICAL-c322t-258a9a9ff66267f8a7b0b4d63348112829c0578fe87c3fe64bf34e7ea0533fe63</originalsourceid><addsrcrecordid>eNotkE1PAjEQhhujiQT5BV6aeF7sx_ZjjyuiYiAekIRbU5YWS6DFdhfjv3fZdS4z78ybd5IHgHuMxjhnvHicvZeTZTkmCMsxKlDB2BUYEMx4xphA190sM4zE-haMUtqjtmhBuKQDsF6aqonO76D2W7gI3tWhk8HCp3b147b1F1wlvTPQebhoDrXLyp3xdYLPxjt9uDiXJp5dZeDUn10M_tie78CN1YdkRv99CFYv08_JWzb_eJ1NynlWUULqjDCpC11YyznhwkotNmiTbzmlucSYSFJUiAlpjRQVtYbnG0tzI4xGjF40HYKHPvcUw3djUq32oYm-fakIZzxHAueyddHeVcWQUjRWnaI76virMFIdRdVTVBeKqqdI_wDGRWS9</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2656407148</pqid></control><display><type>article</type><title>Securing and Monitoring of Bandwidth Usage in Multi-Agents Denial of Service Environment</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>O., Ogunleye G. ; S.G, Fashoto ; Elliot, Mbunge ; S.A, Arekete ; T.O., Ojewumi</creator><creatorcontrib>O., Ogunleye G. ; S.G, Fashoto ; Elliot, Mbunge ; S.A, Arekete ; T.O., Ojewumi</creatorcontrib><description>The primary purpose of Denial of Service attack (DoS) is to cripple resources so that the resources are made unavailable to the legitimate users. Due to the inadequate monitoring of activities on the network, it has resulted into huge financial losses. Bandwidth which is one of the resources being used on the network, if not properly monitored could result into misused and attack. This paper proposes a real time system for securing and monitoring the amount of bandwidth consumed on the network using the multi-agent framework technology. It also keeps a record of internet protocol (IP) addresses visiting the network and may be used as a starting point for the aspect of response in providing a comprehensive solution to DoS attacks. The bandwidth is pre-entered and an agent is assigned to monitor bandwidth consumption rate against the set threshold. If the bandwidth is consumed above the bandwidth limit and time set, then a DoS attack is suspected taking into considerations the DoS attack framework. This framework can be used as a replicate of what happen in the network scenario environment.</description><identifier>ISSN: 2158-107X</identifier><identifier>EISSN: 2156-5570</identifier><identifier>DOI: 10.14569/IJACSA.2018.090955</identifier><language>eng</language><publisher>West Yorkshire: Science and Information (SAI) Organization Limited</publisher><subject>Bandwidths ; Cybersecurity ; Denial of service attacks ; IP (Internet Protocol) ; Multiagent systems</subject><ispartof>International journal of advanced computer science & applications, 2018, Vol.9 (9)</ispartof><rights>2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c322t-258a9a9ff66267f8a7b0b4d63348112829c0578fe87c3fe64bf34e7ea0533fe63</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>O., Ogunleye G.</creatorcontrib><creatorcontrib>S.G, Fashoto</creatorcontrib><creatorcontrib>Elliot, Mbunge</creatorcontrib><creatorcontrib>S.A, Arekete</creatorcontrib><creatorcontrib>T.O., Ojewumi</creatorcontrib><title>Securing and Monitoring of Bandwidth Usage in Multi-Agents Denial of Service Environment</title><title>International journal of advanced computer science & applications</title><description>The primary purpose of Denial of Service attack (DoS) is to cripple resources so that the resources are made unavailable to the legitimate users. Due to the inadequate monitoring of activities on the network, it has resulted into huge financial losses. Bandwidth which is one of the resources being used on the network, if not properly monitored could result into misused and attack. This paper proposes a real time system for securing and monitoring the amount of bandwidth consumed on the network using the multi-agent framework technology. It also keeps a record of internet protocol (IP) addresses visiting the network and may be used as a starting point for the aspect of response in providing a comprehensive solution to DoS attacks. The bandwidth is pre-entered and an agent is assigned to monitor bandwidth consumption rate against the set threshold. If the bandwidth is consumed above the bandwidth limit and time set, then a DoS attack is suspected taking into considerations the DoS attack framework. This framework can be used as a replicate of what happen in the network scenario environment.</description><subject>Bandwidths</subject><subject>Cybersecurity</subject><subject>Denial of service attacks</subject><subject>IP (Internet Protocol)</subject><subject>Multiagent systems</subject><issn>2158-107X</issn><issn>2156-5570</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNotkE1PAjEQhhujiQT5BV6aeF7sx_ZjjyuiYiAekIRbU5YWS6DFdhfjv3fZdS4z78ybd5IHgHuMxjhnvHicvZeTZTkmCMsxKlDB2BUYEMx4xphA190sM4zE-haMUtqjtmhBuKQDsF6aqonO76D2W7gI3tWhk8HCp3b147b1F1wlvTPQebhoDrXLyp3xdYLPxjt9uDiXJp5dZeDUn10M_tie78CN1YdkRv99CFYv08_JWzb_eJ1NynlWUULqjDCpC11YyznhwkotNmiTbzmlucSYSFJUiAlpjRQVtYbnG0tzI4xGjF40HYKHPvcUw3djUq32oYm-fakIZzxHAueyddHeVcWQUjRWnaI76virMFIdRdVTVBeKqqdI_wDGRWS9</recordid><startdate>2018</startdate><enddate>2018</enddate><creator>O., Ogunleye G.</creator><creator>S.G, Fashoto</creator><creator>Elliot, Mbunge</creator><creator>S.A, Arekete</creator><creator>T.O., Ojewumi</creator><general>Science and Information (SAI) Organization Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>2018</creationdate><title>Securing and Monitoring of Bandwidth Usage in Multi-Agents Denial of Service Environment</title><author>O., Ogunleye G. ; S.G, Fashoto ; Elliot, Mbunge ; S.A, Arekete ; T.O., Ojewumi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c322t-258a9a9ff66267f8a7b0b4d63348112829c0578fe87c3fe64bf34e7ea0533fe63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Bandwidths</topic><topic>Cybersecurity</topic><topic>Denial of service attacks</topic><topic>IP (Internet Protocol)</topic><topic>Multiagent systems</topic><toplevel>online_resources</toplevel><creatorcontrib>O., Ogunleye G.</creatorcontrib><creatorcontrib>S.G, Fashoto</creatorcontrib><creatorcontrib>Elliot, Mbunge</creatorcontrib><creatorcontrib>S.A, Arekete</creatorcontrib><creatorcontrib>T.O., Ojewumi</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced computer science & applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>O., Ogunleye G.</au><au>S.G, Fashoto</au><au>Elliot, Mbunge</au><au>S.A, Arekete</au><au>T.O., Ojewumi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Securing and Monitoring of Bandwidth Usage in Multi-Agents Denial of Service Environment</atitle><jtitle>International journal of advanced computer science & applications</jtitle><date>2018</date><risdate>2018</risdate><volume>9</volume><issue>9</issue><issn>2158-107X</issn><eissn>2156-5570</eissn><abstract>The primary purpose of Denial of Service attack (DoS) is to cripple resources so that the resources are made unavailable to the legitimate users. Due to the inadequate monitoring of activities on the network, it has resulted into huge financial losses. Bandwidth which is one of the resources being used on the network, if not properly monitored could result into misused and attack. This paper proposes a real time system for securing and monitoring the amount of bandwidth consumed on the network using the multi-agent framework technology. It also keeps a record of internet protocol (IP) addresses visiting the network and may be used as a starting point for the aspect of response in providing a comprehensive solution to DoS attacks. The bandwidth is pre-entered and an agent is assigned to monitor bandwidth consumption rate against the set threshold. If the bandwidth is consumed above the bandwidth limit and time set, then a DoS attack is suspected taking into considerations the DoS attack framework. This framework can be used as a replicate of what happen in the network scenario environment.</abstract><cop>West Yorkshire</cop><pub>Science and Information (SAI) Organization Limited</pub><doi>10.14569/IJACSA.2018.090955</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2158-107X |
ispartof | International journal of advanced computer science & applications, 2018, Vol.9 (9) |
issn | 2158-107X 2156-5570 |
language | eng |
recordid | cdi_proquest_journals_2656407148 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Bandwidths Cybersecurity Denial of service attacks IP (Internet Protocol) Multiagent systems |
title | Securing and Monitoring of Bandwidth Usage in Multi-Agents Denial of Service Environment |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T16%3A56%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Securing%20and%20Monitoring%20of%20Bandwidth%20Usage%20in%20Multi-Agents%20Denial%20of%20Service%20Environment&rft.jtitle=International%20journal%20of%20advanced%20computer%20science%20&%20applications&rft.au=O.,%20Ogunleye%20G.&rft.date=2018&rft.volume=9&rft.issue=9&rft.issn=2158-107X&rft.eissn=2156-5570&rft_id=info:doi/10.14569/IJACSA.2018.090955&rft_dat=%3Cproquest_cross%3E2656407148%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2656407148&rft_id=info:pmid/&rfr_iscdi=true |