Authors :
Pascal HABUMUGISHA; Dr. Musoni Wilson
Volume/Issue :
Volume 9 - 2024, Issue 2 - February
Google Scholar :
http://tinyurl.com/yx5pe7hx
Scribd :
http://tinyurl.com/4wusrd26
DOI :
https://doi.org/10.5281/zenodo.10670368
Abstract :
The controls employed to safeguard the
availability, confidentiality, and integrity of data and
information systems are known as security
countermeasures. At every level of the stack, a vast
range of security controls are accessible. It is essential to
prevent malicious damage while information is carried
over a network. Additional security measures, the
removal of unnecessary services, hardening systems, and
access control can all significantly improve overall
security. Therefore, sandbox systems are essential to the
secure operation of countermeasures against network
security. Networked information is susceptible to a wide
range of assaults. In this paper, we suggested an isolation
table for hierarchical networks to identify intrusions and
estimate the impact of intrusion detection.
The main experiment shows that sandboxing is a
useful tool for preventing attacks. The goal of this study
was to compare intrusion detection and prevention
systems (IDS/IPS) with sandboxes in computer network
security. The primary goals of this study are to examine
the value of sandboxing computer network security
countermeasures in comparison to identification and
prevention systems (IDS/IPS) and to examine the
procedures that need to be followed in order to launch
different types of active and passive assaults on the
network. harmful attacks are bad for the Network and
for anyone that use the Internet without enough security.
We need to put in place trustworthy security. for a
variety of uses.
The qualitative method of primary research will be
used to obtain the research study's outcomes. The
targeted sample population (IT) is to be interviewed in
an open-ended manner, providing them with an
opportunity to fully express their perspectives regarding
the study problem and the questions posed. Additionally,
the study's sample population included NISR IT
personnel. Both primary and secondary data were used;
primary data were gathered through questionnaires, and
secondary data came from pre-existing datasets. R Data
Analytics, Manage Engine Analytics Plus, NMAP,
Advanced IP Scanner, Wireshark, and Kali Linux for
penetration testing algorithms will be utilized for model
analysis. Analyzing performance model methodologies is
the goal of this study.
Keywords :
Sandbox, NMPA, kali Linux, IP Scanner, Big Data, Wire Shark.
The controls employed to safeguard the
availability, confidentiality, and integrity of data and
information systems are known as security
countermeasures. At every level of the stack, a vast
range of security controls are accessible. It is essential to
prevent malicious damage while information is carried
over a network. Additional security measures, the
removal of unnecessary services, hardening systems, and
access control can all significantly improve overall
security. Therefore, sandbox systems are essential to the
secure operation of countermeasures against network
security. Networked information is susceptible to a wide
range of assaults. In this paper, we suggested an isolation
table for hierarchical networks to identify intrusions and
estimate the impact of intrusion detection.
The main experiment shows that sandboxing is a
useful tool for preventing attacks. The goal of this study
was to compare intrusion detection and prevention
systems (IDS/IPS) with sandboxes in computer network
security. The primary goals of this study are to examine
the value of sandboxing computer network security
countermeasures in comparison to identification and
prevention systems (IDS/IPS) and to examine the
procedures that need to be followed in order to launch
different types of active and passive assaults on the
network. harmful attacks are bad for the Network and
for anyone that use the Internet without enough security.
We need to put in place trustworthy security. for a
variety of uses.
The qualitative method of primary research will be
used to obtain the research study's outcomes. The
targeted sample population (IT) is to be interviewed in
an open-ended manner, providing them with an
opportunity to fully express their perspectives regarding
the study problem and the questions posed. Additionally,
the study's sample population included NISR IT
personnel. Both primary and secondary data were used;
primary data were gathered through questionnaires, and
secondary data came from pre-existing datasets. R Data
Analytics, Manage Engine Analytics Plus, NMAP,
Advanced IP Scanner, Wireshark, and Kali Linux for
penetration testing algorithms will be utilized for model
analysis. Analyzing performance model methodologies is
the goal of this study.
Keywords :
Sandbox, NMPA, kali Linux, IP Scanner, Big Data, Wire Shark.