Open Access Open Access  Restricted Access Subscription or Fee Access

Agent-Controller based Security Infrastructure for Enterprise Network

B. Thanudas, S. Sreelal, B.S. Manoj, V. Cyril Raj, Dr. Sumathy Eswaran


Enterprise network security is becoming a very important and challenging task. Off-the-shelf tools and products are often found to be insufficient for large enterprises and government Research & Development (R&D) organizations. Many times, enterprise system administrators do not have the freedom to customize the network security systems of commercial type to the fullest needs of the enterprise. In addition, requirements of Government R&D establishments on providing the state-of-the-art information/cyber-security, are unable to be met by the commercial off-the-shelf enterprise network security suits. Such network security solutions like firewalls and intrusion detection systems (IDSs) provide only limited protection from the fast growing highly sophisticated cyber malwares (HSCMs). In this paper, we propose the agent-controller based security infrastructure for enterprise network for the use in Indian Space Research Organization (ISRO) and other government scientific R&D departments. The agent-controller infrastructure is tightly integrated with the organization’s network system in order to provide a highly customized solution.


Enterprise Networks, Network Security, Highly Sophisticated Cyber Malwares, Agents, Controller, Intrusion Detection System, Firewall, Botnet, Anti-virus

Full Text:



R. Langner, “Stuxnet: Dissecting a Cyberwarfare Weapon,” IEEE Security and Privacy Magazine, Vol. 9, No. 3, pp. 49-51, May 2011.

D. P. Fidler, “Was Stuxnet an Act of War? Decoding a Cyber attack,” IEEE Security and Privacy Magazine, Vol. 9, No. 4, pp. 56-59, April 2011.

E. Chien, L. OMurchu, and N. Falliere, “W32.Duqu: The Precursor to the Next Stuxnet,” Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats 2012 (LEET 2012), April 2012.

M. S. Vinay and Manoj Balakrishnan, “A Comparison of Three Sophisticated Cyber Weapons,” in Managing Trust in Cyberspace, Edited by S. Thampi, Bharat Bhargava, and P. Atrey, Taylor Francis, USA, December 2013.

A. Cardenas, S. Amin, Z.-S. Lin, Y.-L. Hua, and S. Sastry, “Attacks Against Process Control Systems: Risk Assessment, Detection, and Response,” Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security 2011, pp.355-366, March 2011.

D.Andriesse, and H.Bos, Än Analysis of the Zeus Peer-to-Peer Protocol,"Technical Report IR-CS-74, May 2013

B.Thanudas, S.Sreelal, and V.Cyril Raj, "Survey of Botnets and Detection Methodologies on an Enterprise Network," Proceedings of National Conference on Innovative Computing Tecchniques NCICT 2014, April 2014.

Jiawei Han and Micheline Kamber, “Data Mining: Concepts and Techniques,” Morgan Kufmann, 3rd Edition 2011.

B.Thanudas, Sheena.S.Rajan, S.Sreelal, and B.S. manoj, "A survey on Botnet Detection Techniques," Proccedings of ISRO Conference on Computers and Information Technology-2015(ISCIT-2015), March 2015.

Rohit Tyagi, Tuhin Paul, BS Manoj, and B.Thanudas, “A Novel HTTP Botnet Traffic Detection Method,” IIST-VSSC Technical Report, December 2014.

Rohit Tyagi, Tuhin Paul, BS Manoj, and B.Thanudas, “Fast-flux Botnet Detection from Network Traffic,” 2014 Annual IEEE Conference (INDICON), December 2014, IEEE Xplore.

Rohit Tyagi, Tuhin Paul, BS Manoj and B. Thanudas, “Packet Inspection for Unauthorized OS Detection in Enterprises,” accepted for publication in IEEE Security and Privacy Magazine, 2015.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.