presented in this work, tests with different types of
networks, such as factories, large providers and
industries shall be performed, aiming to evaluate
and perfect the model proposed for generation of
baseline.
Another future work being developed refers to
the creation of a multiparametric model for alarms
generation aiming to aid the security, performance
and fault management, using a set of some
monitored objects baseline, such as IP, TCP, UDP
and ICMP packet traffic, traffic volume in bytes and
number of errors. The model consists in the
utilization of a baseline set, information about
possible network anomalies and rules for alarm
generation based on thresholds in differentiated
levels, which would indicate specific conditions to
customizable problems to the network. A creation of
an efficient mechanism of anomaly detection and
alarm generation is expected.
REFERENCES
Duffield, N.G.; Grossglauser, M. (2001, June) Trajectory
sampling for direct traffic observation;
Networking,
IEEE/ACM Transactions on, Volume: 9, Issue: 3,
Pages: 280 – 292.
Cabrera, J.B.D.; Lewis, L.; Xinzhou Qin; Wenke Lee;
Prasanth, R.K.; Ravichandran, B.; Mehra, R.K. (2001,
May);
Proactive detection of distributed denial of
service attacks using MIB traffic variables-a
feasibility study,
Integrated Network Management
Proceedings, IEEE/IFIP International Symposium on ,
Pages:609 – 622.
Northcutt, Stephen, Novak Judy. (2002) Network
Intrusion Detection, Third Edition, New Riders.
GBA, Ferramenta para Auxílio no Gerenciamento
Backbone Automatizado, Retrieved 03/05/2004 from
http://proenca.uel.br/gba/.
MRTG, The Multi Router Traffic Grapher , Retrieved
03/05/2004 from
http://people.ee.ethz.ch/~oetiker/webtools/mrtg/.
Rueda, A.; Kinsner (1996, May);
A survey of traffic
characterization techniques in telecommunication
networks,
Electrical and Computer Engineering,
Canadian Conference on, Vol.2, Pages:830-833.
Dilman, M.; Raz, D. (2002, May)
Efficient reactive
monitoring
Selected Areas in Communications, IEEE
Journal on, Vol.20, Iss.4, Pages:668-676.
Hajji, H. (2003, May);
Baselining network traffic and
online faults detection; Communications, ICC '03.
IEEE International Conference on, Volume: 1, 11-
Pages: 301 – 308.
Thottan, M.; Chuanyi Ji (2003, Aug);
Anomaly detection
in IP networks,
Signal Processing, IEEE Transactions
on Volume:51, Issue:8, Pages:2191–2204.
Papavassiliou, S.; Pace, M.; Zawadzki, A.; Ho, L. (2000,
June);
Implementing enhanced network maintenance
for transaction access services: tools and applications,
Communications, 2000. ICC 2000. IEEE International
Conference on, Volume: 1, 18-22, Pages: 211 - 215
vol.1.
Proença, Mario Lemes, Jr. (2001, September) "Uma
Experiência de Gerenciamento de Rede com
Backbone ATM através da Ferramenta GBA", Artigo
publicado no congresso, XIX Simpósio Brasileiro de
Telecomunicações – SBrT 2001, Fortaleza 03-
06/09/2001.
RFC-1213, INTERNET ENGINEERING TASK FORCE
(IETF) (1991, March) Management Information Base
for Network Management of TCP/IP-based internets:
MIB-II.
Bland J. Martin and Altman Douglas G. (1986), Statistical
Methods For Assessing Agreement Between Two
Methods of Clinical Measurement, The LANCET
i:307-310, February 8, 1986.
Bussab, Wilton O.; Morettin Pedro A. (2003) Estatística
Básica, Editora Saraiva, 5a edição.
Papoulis, Athanasios, Pillai S. Unnikrishna. (2002)
Probability, Random Variables and Stochastic
Processes, Fourth Edition, McGraw-Hill.
Leland Will E., Taqqu M. S., Willinger W., Wilson D. V.,
(1994) On the Self-Similar Nature of Ethernet Traffic
(Extended Version), IEEE/ACM Transactions on
Networking, volume 2, No 1, February 1994.
ICETE 2004 - SECURITY AND RELIABILITY IN INFORMATION SYSTEMS AND NETWORKS
160