Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login / Sign Up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Network Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    Paper Title

    A METHOD FOR ENDPOINT AWARE INSPECTION IN A NETWORK SECURITY SOLUTION

    Description / Abstract

    Due to the flood in remote work after the episode of Covid, network security has gained a giant fixation. The issue of mixed-up audit decisions in network security plans has for quite a while been reprimanded, but the meaning of the decision precision has never been overall around as critical as today. In this paper we offer a response for additional fostering the assessment decision accuracy by deciding a method for endpoint careful survey in an association security plan prepared for performing significant package examination. The method utilizes a subset of the protected association to gather hash fingerprints from the endpoint application network traffic plans. The information collected from this subset is then utilized for procuring endpoint care for the rest of the protected organization. We use strategies that work on the application layer of the show stack. This makes the strategy fitting not only for neighborhood executions, as NGFWs and IPSs, yet also for SaaS and SASE game plans. The methodology is, regardless, conveniently utilized with lower layer information, for instance, association and transport layer information, for working system care too. We similarly present a proof-of-thought context-oriented examination where that is the thing we see, of the relevant association affiliations, 100% could be recognized while the functioning system and endpoint application were accessible in the source pack. All things considered, this is the primary method to redesign the assessment cycle accuracy by using a subset of the protected association to secure endpoint care.

    User Profile
    Vishesh Narendra Pamadi
    Reviewer 4.6
    User Profile
    Pattabi Ramarao Thumati
    Reviewer 4.2
    User Profile
    Shreyas Mahimkar
    Reviewer 4.2
    User Profile
    Sumit Shekhar
    Reviewer 4.2
    User Profile
    Pavan Kanchi
    Reviewer 4.2

    Vishesh Narendra Pamadi Reviewer

    badge Review Request Accepted

    Vishesh Narendra Pamadi Reviewer

    badge Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Positive Comments:

    1. Relevance and Originality: The paper tackles a pressing issue in network security, especially relevant given the increase in remote work post-COVID-19. The novel approach to improving decision accuracy using endpoint assessment is both original and valuable.
    2. Methodology: The use of hash fingerprints from a subset of the network to enhance endpoint security is innovative and broadly applicable across different security solutions, including NGFWs and SaaS.
    3. Validity & Reliability: The proof-of-concept showing a 100% recognition rate indicates the method’s effectiveness and reliability in identifying network affiliations.
    4. Clarity and Structure: The paper is well-organized, presenting the problem, solution, and proof-of-concept clearly. The explanation of the method's operation across different network layers is clear and comprehensive.

    Negative Comments:

    1. Relevance and Originality: The paper could benefit from a comparison with existing solutions to highlight its unique contributions and advantages more clearly.
    2. Methodology: Details on the specific techniques for collecting and analyzing hash fingerprints are vague. More information on experimental setup and comparisons with existing methods would be helpful.
    3. Validity & Reliability: The proof-of-concept results are promising but lack detailed information on testing conditions and limitations. Additional validation in varied environments would strengthen reliability.
    4. Clarity and Structure: The explanation of the method’s application to different network layers is somewhat unclear. More detailed examples or case studies could improve understanding.


    IJ Publication Publisher

    Thank you

    Publisher

    User Profile

    IJ Publication

    All Reviewers

    User Profile

    Vishesh Narendra Pamadi

    Reviewer
    User Profile

    Pattabi Ramarao Thumati

    Reviewer
    User Profile

    Shreyas Mahimkar

    Reviewer
    User Profile

    Sumit Shekhar

    Reviewer
    User Profile

    Pavan Kanchi

    Reviewer

    More Detail

    User Profile

    Paper Category

    Cyber Security

    User Profile

    Journal Name

    IJCRT - International Journal of Creative Research Thoughts

    User Profile

    p-ISSN

    User Profile

    e-ISSN

    2320-2882

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp