ANALYSIS AND COMPARISON OF THE FUNCTIONALITY OF NETWORK MONITORING TOOLS
Verovko Mariya, Chernihiv National University of Technology (95 Shevchenka Str., 14027 Chernihiv, Ukraine)
Posadska Iryna, Chernihiv National University of Technology (95 Shevchenka Str., 14027 Chernihiv, Ukraine)
The analysis and comparison of the functionality of the most popular network monitoring and traffic monitoring tools is described in the paper. The results of the investigation of the network monitoring and traffic monitoring tools performance, tested in the real LAN, are also presented.
network, traffic, monitoring, LAN
Y. Breitbart et al. Efficiently monitoring bandwidth and latency in IP networks. In Proc. IEEE Infocom, pages 933–942, 2001.
R. Caceres et al. Measurement and analysis of IP network usage and behavior. IEEE Communications Magazine, pages 144–151, May 2000.
Y. Yemini, G. Goldschmidt, and S. Yemini. Network management by delegation. In Proc. of IFIP/IEEE International Symposium on Integrated Network Management, pages 95–107, 1991.
F. T. Grampp and R.H. Morris, “Unix operating system security”, AT and T Bell Labs Technical Journal, vol. 63, Oct. 1984.
S. M. Bellovin, “Security problems in the TCP/IP protocol suite”, Computer Communications Review, vol. 19, April 1989.
Radha S. Shirbhate, Pallavi A. Patil. Network Traffic Monitoring Using Intrusion Detection System. International Journal of Advanced Research in Computer Science and Software Engineering. Volume 2, Issue 1, January 2012
Li Li, Marina Thottan, Bin Yao, Sanjoy Paul. Distributed Network Monitoring with Bounded Link Utilization in IP Networks. IEEE INFOCOM 2003.