Project Login
Registration No:
Password:
MAIL ALERTS SMS ALERTS
 
     
   
     

VIRTUAL NETWORK MONITORING

Platform : JAVA

ABSTRACT The demand for cost and time saving technologies in combination with competitive pressures within corporate environments has made VPN (Virtual Private Network) technology an alternative option for enterprise network connectivity. However, the amount of available information and the speed at which technical landscapes are changing quickly outpaces typical VPN solutions being developed. Rapid development and abundant options create complexity for network designers with respect to choosing and implementing the proper VPN technology. VIRTUAL NETWORK MONITORING SYSTEM is a Java tool to observe network traffic virtually. Network administrators facilitate to monitor VPN (PPTP / IPSec / SSH) and SSL (HTTPS) connectivity of wire line/wireless networks. The graphical representation makes it easy to visualize messages being sent between computer nodes. Users can also read messages not of the above types in plain text. Connection statistics can be used as a measure of network security. The PRO edition allows network administrators to monitor multiple and remote networks. Purpose The purpose of this document is to give the overview of the project. The main aim of this project is to observe network traffic virtually. Network administrators facilitate to monitor VPN (PPTP / IPSec / SSH) and SSL (HTTPS) connectivity of wire line/wireless networks. The graphical representation makes it easy to visualize messages being sent between computer nodes. Users can also read messages not of the above types in plain text. Connection statistics can be used as a measure of network security. The PRO edition allows network administrators to monitor multiple and remote networks. Virtual Network Monitoring System will focus on number of functionalities for monitoring network traffic and security. Existing System Restricted Access to Desirable Services A firewall may well restrict certain inherently dangerous services which users of the protected network nevertheless want to use. Services for which proxy servers do not (yet) exist will effectively be blocked by proxy firewalls; newer services such as WAIS were not designed to work with firewalls and, by their very newness, are considered to be unsafe . Compromises by the designers of the security policy may be necessary in order to prevent the users from circumventing the firewall completely. Decrease in Throughput Firewalls may represent a significant bottleneck in communication between the protected network and the outside world. However, this is less of a problem than is generally assumed, as most firewalls can pass data at T1 rates (1.5 mpbs), while most sites are connected at rates less than T1. Concentrated Security While having security concentrated on one host has its advantages, a compromise of the firewall could be disastrous to hosts which are not running their own security software]. The question is whether a more likely, but smaller, security breach is better or worse than a less likely large breach. Complicancy Both users and management may tend to become complacent about security when a firewall is installed. Investing time and money in a firewall is not particularly useful if other methods for stealing data or attacking systems are neglected. User security education is essential, since legitimate users are already inside the protected network. Physical security is also often neglected - implementing the most powerful firewalls and having the most carefully designed security policy is useless if someone can simply walk off with the server. .Proposed system Our proposed system is Virtual Network Monitoring System,as the popularity of the Internet grew, businesses turned to it as a means of extending their own networks. First came intranets, which are password-protected sites designed for use only by company employees. Now, many companies are creating their own VIRTUAL NETWORK MONITORING SYSTEM(virtual private network) to accommodate the needs of remote employees and distant offices. Basically, a VIRTUAL NETWORK MONITORING is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VIRTUAL NETWORK uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee. In this article, you will gain a fundamental understanding of VIRTUAL NETWORk’s, and learn about basic VIRTUAL NETWORK components, technologies, tunneling and security. Modules Of The Product There are basically five modules for developing Capturing Packets By choosing a network card can capture packets from the network.It will list out all the network devices in the system, when we select one of those devices this application will capture all the packets coming form that device. Drawing Connections In the network traffic visualization, VPN and SSL connections are represented in colors other than black. When the packets are captured from the network card then it will captures all the IP addresses of the systems which are connected in the network. Plotting Network Each message captured by VIRTUAL WATCH SYSTEM is represented graphically by an edge connecting two computers. Since messages are sent both ways ,when a message is passing from one system to another system then a edge connecting those two computers are drown dynamically. Dumping Text All messages not sent through VPN nor SSL are printed onto the screen. The latest arriving message will be appear at the top of the table. Different filters will be developed to locate messages containing sensitive information. Collecting Statistics Dynamic updating of the statistics table. The statistics table collects the fractions of secure connections and packets in the network. It will represent all the information how many packets are transferred in the subnet. Resolving IP Address: VIRTUAL WATCH SYSTEM will support the functionalities of resolving IP addresses to hostnames depending on the capturing device. HARDWARE SPECIFICATIONS: Processor Name : Pentium-III Processor Speed : 677 MHZ RAM : 256 MB Hard Disk Capacity : 20 GB SOFTWARE SPECIFICATIONS: Application Language : JAVA 1.4.X Libraries : JPCAP, WINPCAP Operating System : WINDOWS 2000 PROFESSIONAL

NOW GET PROJECTS ! GET TRAINED ! GET PLACED !

IEEE, NON-IEEE, REAL TIME LIVE ACADEMIC PROJECTS,

PROJECTS WITH COMPLETE COURSES,SOFT SKILLS & PLACEMENTS

ALLOVER INDIA & WORLD WIDE,

HOSTEL FACILITY AVAILABLE FOR GIRLS & BOYS SEPARATELY,

CALL: 08985129129 ,  E-Mail Id: support@ascentit.in

REGISTER FOR PROJECTS NOW ! GET DISCOUNT
   
1