Nagios is a stable, scalable and extensible enterprise-class network and system monitoring tool which allows administrators to monitor network and host resources such as HTTP, SMTP, POP3, disk usage and processor load. Originally Nagios was designed to run under Linux, but it can also be used on several UNIX o132perating systems. This chapter covers the installation and parts of the configuration of Nagios. The purpose of this paper is not only to introduce to everyone the concept of distributed monitoring with Nagios but capturing the beauty of it to improve the security of computer networks. Firstly, an introduction to Nagios will be discussed to provide readers a brief overview of what Nagios is. Next, it will discuss how distributed network monitoring is an essential part to information security. It will then proceed to introducing the requirements needed to build a distributed Nagios network monitoring environment and demonstrate how Nagios can be configured to construct a distributed monitoring environment that helps improve the state of security of distributed networks. In essence, companies hould be aware of the need for hiring specialized security analysts to perform round-the-clock systems monitoring to secure their resources.
Published in | American Journal of Networks and Communications (Volume 2, Issue 6) |
DOI | 10.11648/j.ajnc.20130206.11 |
Page(s) | 140-148 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2013. Published by Science Publishing Group |
Nagois, CPAN, NET-SNMPD, CGI etc
[1] | Lamsal, P. "Management of the Next Generation IP Core Network." 16th April 1999. URL: http://www.tml.hut.fi/Opinnot/Tik- 110.551/1999/papers/12ManagementOfIPngCore/ipcore.html |
[2] | Winkler, Ira. "Ounce of Prevention." November 1999. URL: http://www.infosecuritymag.com/articles/1999/winkler.shtml |
[3] | Walker, L. "The View From Symantec's Security Central." 9th January 2003. URL: http://www.washingtonpost.com/wp-dyn/articles/A28625-2003Jan8.html |
[4] | Messmer, E. and Pappalardo, D. "A Year After Meltdown: No Silver Bullet for DoS." 2nd May 2001. URL: http://www.nwfusion.com/news/2001/0205ddos.html FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 |
[5] | CERT/CC "CERT Advisory CA-2002-03 Multiple Vulnerabilities in Implementations of the Simple Network Management Protocol (SNMP)." 4th August 2003. URL: http://www.cert.org/advisories/CA-2002-03.html |
[6] | Kamthan, P. "CGI Security: Better Safe Than Sorry." 19th September 1999. URL: http://tech.irt.org/articles/js184/[28] - [30] Refer to [15]. |
[7] | Polombo, D. "Prelude HOWTO." 16th September 2002. URL: http://www.prelude-ids.org/article.php3?id_article=6[32] Refer to [11]. |
[8] | Habib, A., Hefeeda, M. M. and Bhargava, B. K. "Detecting Service Violations and DoS Attacks." 2002. URL: http://216.239.39.104/search?q=cache:m4uV_rBx9hIJ:www.isoc.org/isoc/conferences/ndss/03/proceedings/papers/12.pdf+detecting+service+violations+and+dos+attacks&hl=en&ie=UTF-8 |
APA Style
Diponkar Paul, Shamsuddin Majamder. (2013). Working with TCP\IP Based Network Monitoring System Using Linux. American Journal of Networks and Communications, 2(6), 140-148. https://doi.org/10.11648/j.ajnc.20130206.11
ACS Style
Diponkar Paul; Shamsuddin Majamder. Working with TCP\IP Based Network Monitoring System Using Linux. Am. J. Netw. Commun. 2013, 2(6), 140-148. doi: 10.11648/j.ajnc.20130206.11
AMA Style
Diponkar Paul, Shamsuddin Majamder. Working with TCP\IP Based Network Monitoring System Using Linux. Am J Netw Commun. 2013;2(6):140-148. doi: 10.11648/j.ajnc.20130206.11
@article{10.11648/j.ajnc.20130206.11, author = {Diponkar Paul and Shamsuddin Majamder}, title = {Working with TCP\IP Based Network Monitoring System Using Linux}, journal = {American Journal of Networks and Communications}, volume = {2}, number = {6}, pages = {140-148}, doi = {10.11648/j.ajnc.20130206.11}, url = {https://doi.org/10.11648/j.ajnc.20130206.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.20130206.11}, abstract = {Nagios is a stable, scalable and extensible enterprise-class network and system monitoring tool which allows administrators to monitor network and host resources such as HTTP, SMTP, POP3, disk usage and processor load. Originally Nagios was designed to run under Linux, but it can also be used on several UNIX o132perating systems. This chapter covers the installation and parts of the configuration of Nagios. The purpose of this paper is not only to introduce to everyone the concept of distributed monitoring with Nagios but capturing the beauty of it to improve the security of computer networks. Firstly, an introduction to Nagios will be discussed to provide readers a brief overview of what Nagios is. Next, it will discuss how distributed network monitoring is an essential part to information security. It will then proceed to introducing the requirements needed to build a distributed Nagios network monitoring environment and demonstrate how Nagios can be configured to construct a distributed monitoring environment that helps improve the state of security of distributed networks. In essence, companies hould be aware of the need for hiring specialized security analysts to perform round-the-clock systems monitoring to secure their resources.}, year = {2013} }
TY - JOUR T1 - Working with TCP\IP Based Network Monitoring System Using Linux AU - Diponkar Paul AU - Shamsuddin Majamder Y1 - 2013/12/30 PY - 2013 N1 - https://doi.org/10.11648/j.ajnc.20130206.11 DO - 10.11648/j.ajnc.20130206.11 T2 - American Journal of Networks and Communications JF - American Journal of Networks and Communications JO - American Journal of Networks and Communications SP - 140 EP - 148 PB - Science Publishing Group SN - 2326-8964 UR - https://doi.org/10.11648/j.ajnc.20130206.11 AB - Nagios is a stable, scalable and extensible enterprise-class network and system monitoring tool which allows administrators to monitor network and host resources such as HTTP, SMTP, POP3, disk usage and processor load. Originally Nagios was designed to run under Linux, but it can also be used on several UNIX o132perating systems. This chapter covers the installation and parts of the configuration of Nagios. The purpose of this paper is not only to introduce to everyone the concept of distributed monitoring with Nagios but capturing the beauty of it to improve the security of computer networks. Firstly, an introduction to Nagios will be discussed to provide readers a brief overview of what Nagios is. Next, it will discuss how distributed network monitoring is an essential part to information security. It will then proceed to introducing the requirements needed to build a distributed Nagios network monitoring environment and demonstrate how Nagios can be configured to construct a distributed monitoring environment that helps improve the state of security of distributed networks. In essence, companies hould be aware of the need for hiring specialized security analysts to perform round-the-clock systems monitoring to secure their resources. VL - 2 IS - 6 ER -