Multilevel Architecture of a Computer Network Operation Monitoring System With an Anomaly Diagnostics Module
Abstract
This article is a continuation of research that focuses on the timely detection and rapid response to anomalies in the computer network with a network monitoring system with additional anomaly diagnostics module. The multi-level architecture of the network monitoring system with the module of additional anomaly diagnostics, which takes into account the modular way of organizing such an information system. Described situations in which the proposed architecture can be applied, listed its advantages and disadvantages. Process of forming of working scenarios at processing of anomaly in functioning of computer network with the account of the given architecture of monitoring system with a module of additional diagnostics of anomalies of such network is also described. Approaches to the formation of input and output data when creating a work scenario are considered
References
K. S. Shardakov, “Sravnitelnyi analiz populiarnykh sistem monitoringa setevogo oborudovaniia, rasprostraniaemykh po litsenzii GPL” [Comparative Analysis of the Popular Monitoring Systems for Network Equipment Distributed Under the GPL License], Intellectual Technologies on Transport, no. 1(13), pp. 44–48, 2018 (in Russian).
D. I. Krosnoper, “Sistemy monitoringa sostoianiia seti i ee komponentov” [Systems for monitoring the state of the network and its component], New information technologies in automated systems, no. 13, pp. 209–211, 2010 (in Russian).
P. Salvador and R. Valadas, “A Network Monitoring System with a Peer-to-Peer Architecture,” in Proc. 3rd International Workshop on Internet Performance, Simulation, Monitoring and Measurement, March 15-16, 2005, Warsaw, Poland, pp. 14–15, 2005.
J. Dhillipan, N. Vijayalakshmi, and S. Suriya, “Network Monitoring System Using Ping Methodology and GUI,” Recent Trends and Advances in Artificial Intelligence and Internet of Things, vol. 172, pp. 13–22, 2019; doi:10.1007/978-3-030-32644-9_2
D. Eridani, E. D. Widianto, R. D. O. Augustinus, and A. A. Faizal, “Monitoring System in Lora Network Architecture using Smart Gateway in Simple LoRa Protocol,” International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Yogyakarta, Indonesia, 2019, pp. 200–204, 2019; doi:10.1109/ISRITI48646.2019.9034612
K. Krinkin, I. Kulikov, A. Vodyaho, and N. Zhukova, “Architecture of a Telecommunications Network Monitoring System Based on a Knowledge Graph,” in 26th Conference of Open Innovations Association (FRUCT), Yaroslavl, pp. 231–239, 2020 (in Russian) doi: 10.23919/FRUCT48808.2020.9087429
S. Maes, “ITSM and ESM in the Bigger World. Separation of Concerns: A Modern Approach of ITIL for the Enterprise,” OSF Preprints, pp. 1–19, 2022; doi:10.31219/osf.io/ugr3p
J. Deutscher and C. Felden, “Concept for implementation of cost effective Information Technology Service Management (ITSM) in organizations,” in Proc. of IEEE/IFIP Network Operations and Management Symposium Workshops, Osaka, Japan, 2010, pp. 167–168, 2010; doi:10.1109/NOMSW.2010.5486580
M. I. Avilov, “Role network monitoring system in the technical cyber defence exercise,” Proceedings of Saint Petersburg Electrotechnical University, no. 2, pp. 43–47, 2019 (in Russian).
M. I. Avilov, Yu. A. Shichkina, and M. S. Kupriyanov, “Monitoring of an information and communication computer network using a neural network module,” Proceedings of Saint Petersburg Electrotechnical University, no. 5, pp. 34–45, 2020 (in Russian).
M. I. Avilov, Yu. A. Shichkina, “Additional diagnostics of anomalies when monitoring a dynamic computer network using working scenarios,” Proceedings of Saint Petersburg Electrotechnical University, no. 10, pp. 94–102, 2021 (in Russian).
R. H. Shikhaliyev, “A mobile multi-agent-based conceptual architecture for the intelligent monitoring of computer networks,” Problems of information technology, vol. 6, no. 2, pp. 59–64, 2015; doi:10.25045/jpit.v06.i2.07
A. Anuja and K. Apoorva, “Wi-Fi Enabled Personal Computer Network Monitoring System Using Smart Phone with Enhanced Security Measures,” Procedia Computer Science, vol. 70, pp. 114–122, 2015; doi:10.1016/j.procs.2015.10.052
K. S. Prashant et al., “Traffic flow monitoring in software-defined network using modified recursive learning,” Physical Communication, vol. 57, p. 101997, 2023; doi:10.1016/j.phycom.2022.101997
C. Qunying, “Wireless network signal monitoring based on LAN packet capture and protocol analysis on grid programming,” Computer Communications, vol. 157, pp. 45–52, 2020; doi:10.1016/j.comcom.2020.04.001
M. Abdelhafidh, M. Fourati, L. C. Fourati, and A. Chouaya, “Wireless sensor network monitoring system: Architecture, applications and future directions,” International Journal of Communication Networks and Distributed Systems, vol. 23, no. 4, pp. 413–451, 2019; doi:10.1504/IJCNDS.2019.102985
N. Alip, I. Fitri, and N. D. Nathasia, “Network Monitoring System Data Radar Penerbangan berbasis PRTG dan ADSB,” Journal of Information Technology and Computer Science, vol. 3, no. 3, pp. 127–134, 2018; doi:10.31328/jointecs.v3i3.818
D. Harrington et al., “An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks,” in tools.ietf.org, 2002. [Online]. Available: https://tools.ietf.org/html/rfc3411
J. Case et al., “Introduction to Version 3 of the Internet-standard Network Management Framework,” in tools.ietf.org, 1999. [Online]. Available: https://tools.ietf.org/html/rfc2570/
S. Waldbusser et al., “Introduction to the Remote Monitoring (RMON) Family of MIB Modules,” in tools.ietf.org, 2003. [Online]. Available: https://tools.ietf.org/html/rfc3577
B. Claise, ed., “Cisco Systems NetFlow Services Export Version 9,”in tools.ietf.org, 2004. [Online]. Available: https://tools.ietf.org/html/rfc3954
A. D. Vacche and S. K. Lee, Zabbix Mastering, Birmingham, UK: Packt Publ., 2013.
J. Renita and N. E. Elizabeth, “Network’s server monitoring and analysis using Nagios,” in Int. Conf. on Wireless Communications, Signal Processing and Networking, Chennai, India, 2017, pp. 1904–1909, 2017; doi:10.1109/WiSPNET.2017.8300092
Z. Chen et al., “A Cloud Computing Based Network Monitoring and Threat Detection System for Critica Infrastructures,” Big Data Research, vol. 3, pp. 10–23, 2016; doi:10.1016/j.bdr.2015.11.002
V. V. Allakin, N. P. Budko, and N. V. Vasiliev, “A general approach to the construction of advanced monitoring systems for distributed information and telecommunications networks,” Systems of Control, Communication and Security, no. 4, pp. 125–227, 2021 (in Russian); doi:10.24412/2410-9916-2021-4-125-227
This work is licensed under a Creative Commons Attribution 4.0 International License.