Skip to main content
Loading...
Scholar9 logo True scholar network
  • Article ▼
    • Article List
    • Deposit Article
  • Mentorship ▼
    • Overview
    • Sessions
  • Questions
  • Scholars
  • Institutions
  • Journals
  • Login/Sign up
Back to Top

Transparent Peer Review By Scholar9

A METHOD FOR ENDPOINT AWARE INSPECTION IN A NETWORK SECURITY SOLUTION

Abstract

Due to the flood in remote work after the episode of Covid, network security has gained a giant fixation. The issue of mixed-up audit decisions in network security plans has for quite a while been reprimanded, but the meaning of the decision precision has never been overall around as critical as today. In this paper we offer a response for additional fostering the assessment decision accuracy by deciding a method for endpoint careful survey in an association security plan prepared for performing significant package examination. The method utilizes a subset of the protected association to gather hash fingerprints from the endpoint application network traffic plans. The information collected from this subset is then utilized for procuring endpoint care for the rest of the protected organization. We use strategies that work on the application layer of the show stack. This makes the strategy fitting not only for neighborhood executions, as NGFWs and IPSs, yet also for SaaS and SASE game plans. The methodology is, regardless, conveniently utilized with lower layer information, for instance, association and transport layer information, for working system care too. We similarly present a proof-of-thought context-oriented examination where that is the thing we see, of the relevant association affiliations, 100% could be recognized while the functioning system and endpoint application were accessible in the source pack. All things considered, this is the primary method to redesign the assessment cycle accuracy by using a subset of the protected association to secure endpoint care.

Sumit Shekhar Reviewer

badge Review Request Accepted

Sumit Shekhar Reviewer

27 Aug 2024 10:18 AM

badge Approved

Relevance and Originality

Methodology

Validity & Reliability

Clarity and Structure

Results and Analysis

Positive Comments:

This paper addresses a critical issue in network security, particularly the need for improved accuracy in assessment decisions. The proposed method for endpoint monitoring using hash fingerprints from network traffic is innovative and relevant, especially given the increased emphasis on network security due to remote work surges. The approach's applicability across various network configurations, including NGFWs, IPSs, SaaS, and SASE, demonstrates its versatility. The proof-of-concept context-oriented analysis showing 100% identification accuracy provides strong evidence of the method's potential effectiveness.

Negative Comments:

Despite its innovative approach, the paper lacks a detailed evaluation of the method's limitations and potential challenges. For instance, it does not address the scalability of the approach or its performance under different network conditions. Additionally, the description of the methodology is somewhat technical and may benefit from clearer explanations and examples to enhance accessibility. The paper could also improve by including a comparative analysis with existing methods to better contextualize its contributions and highlight any advantages or trade-offs.

avatar

IJ Publication Publisher

ok sir

Publisher

User Profile

IJ Publication

Reviewer

User Profile

Sumit Shekhar

More Detail

User Profile

Paper Category

Cyber Security

User Profile

Journal Name

IJCRT - International Journal of Creative Research Thoughts

User Profile

p-ISSN

User Profile

e-ISSN

2320-2882

Subscribe us to get updated

logo logo

Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

QUICKLINKS

  • What is Scholar9?
  • About Us
  • Mission Vision
  • Contact Us
  • Privacy Policy
  • Terms of Use
  • Blogs
  • FAQ

CONTACT US

  • logo +91 82003 85143
  • logo hello@scholar9.com
  • logo www.scholar9.com

© 2025 Sequence Research & Development Pvt Ltd. All Rights Reserved.

whatsapp