Extended Model of Isolations and Boxing on Main Frame Computer Network Security Counter Measures Based on Big Data


Authors : Pascal HABUMUGISHA; Dr. Musoni Wilson

Volume/Issue : Volume 9 - 2024, Issue 2 - February

Google Scholar : http://tinyurl.com/yx5pe7hx

Scribd : http://tinyurl.com/4wusrd26

DOI : https://doi.org/10.5281/zenodo.10670368

Abstract : The controls employed to safeguard the availability, confidentiality, and integrity of data and information systems are known as security countermeasures. At every level of the stack, a vast range of security controls are accessible. It is essential to prevent malicious damage while information is carried over a network. Additional security measures, the removal of unnecessary services, hardening systems, and access control can all significantly improve overall security. Therefore, sandbox systems are essential to the secure operation of countermeasures against network security. Networked information is susceptible to a wide range of assaults. In this paper, we suggested an isolation table for hierarchical networks to identify intrusions and estimate the impact of intrusion detection. The main experiment shows that sandboxing is a useful tool for preventing attacks. The goal of this study was to compare intrusion detection and prevention systems (IDS/IPS) with sandboxes in computer network security. The primary goals of this study are to examine the value of sandboxing computer network security countermeasures in comparison to identification and prevention systems (IDS/IPS) and to examine the procedures that need to be followed in order to launch different types of active and passive assaults on the network. harmful attacks are bad for the Network and for anyone that use the Internet without enough security. We need to put in place trustworthy security. for a variety of uses. The qualitative method of primary research will be used to obtain the research study's outcomes. The targeted sample population (IT) is to be interviewed in an open-ended manner, providing them with an opportunity to fully express their perspectives regarding the study problem and the questions posed. Additionally, the study's sample population included NISR IT personnel. Both primary and secondary data were used; primary data were gathered through questionnaires, and secondary data came from pre-existing datasets. R Data Analytics, Manage Engine Analytics Plus, NMAP, Advanced IP Scanner, Wireshark, and Kali Linux for penetration testing algorithms will be utilized for model analysis. Analyzing performance model methodologies is the goal of this study.

Keywords : Sandbox, NMPA, kali Linux, IP Scanner, Big Data, Wire Shark.

The controls employed to safeguard the availability, confidentiality, and integrity of data and information systems are known as security countermeasures. At every level of the stack, a vast range of security controls are accessible. It is essential to prevent malicious damage while information is carried over a network. Additional security measures, the removal of unnecessary services, hardening systems, and access control can all significantly improve overall security. Therefore, sandbox systems are essential to the secure operation of countermeasures against network security. Networked information is susceptible to a wide range of assaults. In this paper, we suggested an isolation table for hierarchical networks to identify intrusions and estimate the impact of intrusion detection. The main experiment shows that sandboxing is a useful tool for preventing attacks. The goal of this study was to compare intrusion detection and prevention systems (IDS/IPS) with sandboxes in computer network security. The primary goals of this study are to examine the value of sandboxing computer network security countermeasures in comparison to identification and prevention systems (IDS/IPS) and to examine the procedures that need to be followed in order to launch different types of active and passive assaults on the network. harmful attacks are bad for the Network and for anyone that use the Internet without enough security. We need to put in place trustworthy security. for a variety of uses. The qualitative method of primary research will be used to obtain the research study's outcomes. The targeted sample population (IT) is to be interviewed in an open-ended manner, providing them with an opportunity to fully express their perspectives regarding the study problem and the questions posed. Additionally, the study's sample population included NISR IT personnel. Both primary and secondary data were used; primary data were gathered through questionnaires, and secondary data came from pre-existing datasets. R Data Analytics, Manage Engine Analytics Plus, NMAP, Advanced IP Scanner, Wireshark, and Kali Linux for penetration testing algorithms will be utilized for model analysis. Analyzing performance model methodologies is the goal of this study.

Keywords : Sandbox, NMPA, kali Linux, IP Scanner, Big Data, Wire Shark.

CALL FOR PAPERS


Paper Submission Last Date
31 - May - 2024

Paper Review Notification
In 1-2 Days

Paper Publishing
In 2-3 Days

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe