Abstract
Figuring the network’s hidden abnormal behavior can reduce network vulnerability. This paper presents a detailed architecture in which the collected log data of the network can be processed and analyzed. We process and integrate on-campus network information from every router and store the integrated NetFlow log data. Ceph is used as an open-source distributed storage platform that offers high efficiency, high reliability, scalability, and preliminary preprocessing of raw data with Python, removing redundant areas and unification. In the subanalysis, we discover the anomaly event and absolute flow by three times of standard deviation rule. Keras has been used to classify in-time data collected via a cyber-attack and to construct an automatic identifier template through the Recurring Neural Network (RNN) test. The identification accuracy of the optimization model is around 98% in attack detection. Finally, in the MySQL server, the results of the real-time evaluation can be obtained, and the results of the assessment can be displayed via ECharts.
Highlights
There is no question that in the rapidly moving age of information the Internet has become an integral component of human life
Network traffic information records have been maintained in the databases but a range of network connections have been developed through technological development
REVIEW 1) CEPH Ceph [6] is open source software that is extendable to largescale storage fields specified by software
Summary
There is no question that in the rapidly moving age of information the Internet has become an integral component of human life It masks an unfair network behavior in the Internet world. The regular database was hard to cope with the increasing information [2] To store these materials, it is critical to creating a high-performance, reliable, and scalable storage environment [3]. A. BACKGROUND REVIEW 1) CEPH Ceph [6] is open source software that is extendable to largescale storage fields specified by software. BACKGROUND REVIEW 1) CEPH Ceph [6] is open source software that is extendable to largescale storage fields specified by software It can store large amounts of data at a lower price, provide the balancing system, and information reliability. If a cluster node crashes, it does not affect the entire operation of the storage system
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.