This paper is published in Volume-3, Issue-5, 2017
Area
Computer Science
Author
Ms. Patil Priyanka Nagnath, Dhainje Prakash .B
Org/Univ
Shriram Institute of Engineering & Technology, Paniv, Maharashtra, India
Keywords
Network-level security and protection, Attack Graph Multisink, Measurements, Clustering, Metrics.
Citations
IEEE
Ms. Patil Priyanka Nagnath, Dhainje Prakash .B. A Review on Security to Network using Security Metrics and Multisink Timestamp, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Ms. Patil Priyanka Nagnath, Dhainje Prakash .B (2017). A Review on Security to Network using Security Metrics and Multisink Timestamp. International Journal of Advance Research, Ideas and Innovations in Technology, 3(5) www.IJARIIT.com.
MLA
Ms. Patil Priyanka Nagnath, Dhainje Prakash .B. "A Review on Security to Network using Security Metrics and Multisink Timestamp." International Journal of Advance Research, Ideas and Innovations in Technology 3.5 (2017). www.IJARIIT.com.
Ms. Patil Priyanka Nagnath, Dhainje Prakash .B. A Review on Security to Network using Security Metrics and Multisink Timestamp, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Ms. Patil Priyanka Nagnath, Dhainje Prakash .B (2017). A Review on Security to Network using Security Metrics and Multisink Timestamp. International Journal of Advance Research, Ideas and Innovations in Technology, 3(5) www.IJARIIT.com.
MLA
Ms. Patil Priyanka Nagnath, Dhainje Prakash .B. "A Review on Security to Network using Security Metrics and Multisink Timestamp." International Journal of Advance Research, Ideas and Innovations in Technology 3.5 (2017). www.IJARIIT.com.
Abstract
The emergence of wireless sensor networks (WSNs) can be considered one of the most important revolutions in the field of information and communications technology (ICT). Recently, there has been a dramatic increase in the use of WSN applications such as surveillance systems, battleground applications, object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in such applications. As a result, many solutions and approaches have been proposed for different attacks and vulnerabilities to achieve security requirements. This paper surveys different security approaches for WSNs, examining various types of attacks and corresponding techniques for tackling these. We use multisink timestamp and attack graph based metrics. Multsink Timestamp technique finding out the attacking or sensing the attacking points among all networks in small period of time.For e.g. the large geographical areas where the volcanos or earthquakes may be occurred in future and these techniques finding out those areas provides the security to that area so that we can avoid the volcanos or earthquakes. For finding out the attacks in network we usea three methods Normalized Mean of Path Lengths Metric, Standard Deviation of Path Lengths Metric, Mean of Path Lengths Metric.These three metrics creates clusters of all networks and finding out only the attacking networks. The paper suggests an approach to network attack modeling and security evaluation which is realized in advanced Security Information and Event Management (SIEM) systems. It is based on modeling of computer network and malefactors’ behaviors, building attack graphs, processing current alerts for real-time adjusting of particular attack graphs, calculating different security metrics and providing security assessment procedures. Increasing inclination of people to use software systems for most of the purposes comes a major challenge for software Engineers the engineering of secure software systems. The concept of computer Security is being heavily researched and this perfectly makes sense in a world where e-commerce and e governance are becoming the norms of the day. Along with their potential for making life easier and smarter for people, these systems also carry with them the danger of insecurity. Because any software system is an outcome of some software engineering process it makes sense to incorporate security considerations during the software engineering processes. We use the attack based graph to provide the security to network. For that purpose we use the shortest path metric, the Number of Paths metric, and the Mean of Path Lengths metric are three attack graph-based security metrics that can extract security relevant information. The metric and the Mean of Path Lengths metric fail in the number of ways an attacker may violate a security policy. The Number of Paths metric fails to adequately account for the attack effort associated with the attack paths. To overcome these shortcomings, we propose a complimentary suite of attack graph-based security metrics and specify an algorithm for combining the usage of these metrics. Attack graph can provide clues for the network defender on how an attacker exploits the vulnerability on the network to achieve goals. System administrators use attack graph to determine how vulnerable their systems and to determine what security measures are used to maintain their systems. In a network of large and complex organizations, securing a network is a very challenging task. Attack graphs are very important in the effort to secure the network, because it can directly indicate the presence of vulnerabilities in network and how attackers use the vulnerabilities to implement an effective attack. In this paper, we will describe some very good algorithms can be used to generate the attack graph.