Real-Time Monitoring of Network Devices: Its Effectiveness in Enhancing Network Security

  • Wycliffe Lamech Ogogo Kisii University
Keywords: Real-Time Monitoring, Network Devices, Network Intrusion, Network Security
Share Article:


The business world has been significantly affected by network intrusion leading to infringement of privacy and unprecedented economic losses. Therefore, real-time monitoring of network devices is important due to the enhanced and complex network systems in organizations and associated cyber threats. Real-time monitoring provides adequate alerts and updates regarding specific networks and their performance as soon as they occur. Constant monitoring of devices also makes it possible for organizations to detect any possible challenges that the networks may be encountering. This paper examines the effectiveness of real-time monitoring of network devices in a bid to enhance network security. The study was an empirical review of recently published research papers, journals, internet sites, and books with relevant content. The findings of this study revealed that Real-time device monitoring has many potential advantages to organizations by securing their systems thereby enhancing their overall performance.


Download data is not yet available.


Ambika, M., & Nataraj, R. V. (2013). Architecture for real-time monitoring and modeling of network behavior for enhanced security. International Journal of Computer Applications, 64(8).

Bettany, A., & Halsey, M. (2017). Malware Defense in Depth. In Windows Virus and Malware Troubleshooting (pp. 21-39). Berkeley, CA: Apress.

Brueckner, S. K., & Donovan, M. P. (2018). U.S. Patent No. 10,083,624. Washington, DC: U.S. Patent and Trademark Office.

Chakkaravarthy, S. S., Sangeetha, D., & Vaidehi, V. (2019). A Survey on malware analysis and mitigation techniques. Computer Science Review, 32, 1-23.

Cox, J. H., Chung, J., Donovan, S., Ivey, J., Clark, R. J., Riley, G., & Owen, H. L. (2017). Advancing software-defined networks: A survey. IEEE Access, 5, 25487-25526.

Gupta, A., Birkner, R., Canini, M., Feamster, N., Mac-Stoker, C., & Willinger, W. (2016, November). Network monitoring as a streaming analytics problem. In Proceedings of the 15th ACM Workshop on Hot Topics in Networks (pp. 106-112).

Li, Y., Huang, G. Q., Wang, C. Z., & Li, Y. C. (2019). Analysis framework of network security situational awareness and comparison of implementation methods. EURASIP Journal on Wireless Communications and Networking, 2019, (1) 205.

Ondiege, B., Clarke, M., & Mapp, G. (2017). Exploring a new security framework for remote patient monitoring devices. Computers, 6(1), 11.

Rath, M., Swain, J., Pati, B., & Pattanayak, B. K. (2018). Network security: attacks and control in MANET. In Handbook of Research on Network Forensics and Analysis Techniques (pp. 19-37). IGI Global.

Shin, S., Xu, L., Hong, S., & Gu, G. (2016, August). Enhancing network security through software-defined networking (SDN). In the 2016 25th international conference on computer communication and networks (ICCCN) (pp. 1-9). IEEE.

Sohail, S. (2010). Automation of network management with multidisciplinary concepts. International Journal of Computer Technology and Applications, 1(1), 71-77.

Tsai, P. W., Tsai, C. W., Hsu, C. W., & Yang, C. S. (2018). Network monitoring in software-defined networking: A review. IEEE Systems Journal, 12(4), 3958-3969.

Woodall, W. H., Zhao, M. J., Paynabar, K., Sparks, R., & Wilson, J. D. (2017). An overview and perspective on social network monitoring. IISE Transactions, 49(3), 354-365.

Yuan, Y., Lin, D., Mishra, A., Marwaha, S., Alur, R., & Loo, B. T. (2017, August). Quantitative network monitoring with NetQRE. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication (pp. 99-112).

4 March, 2021
How to Cite
Ogogo, W. (2021). Real-Time Monitoring of Network Devices: Its Effectiveness in Enhancing Network Security. East African Journal of Information Technology, 3(1), 1-6.