0% found this document useful (0 votes)
22 views15 pages

Report On CCN

The document discusses the development of a network traffic analyzer application designed to monitor and manage network usage effectively. It highlights the limitations of existing tools and proposes a new system that utilizes graph-based clustering and rough set theory for better data management and user control. The application aims to enhance network performance and security while providing a user-friendly interface for network owners.

Uploaded by

amanvishwari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views15 pages

Report On CCN

The document discusses the development of a network traffic analyzer application designed to monitor and manage network usage effectively. It highlights the limitations of existing tools and proposes a new system that utilizes graph-based clustering and rough set theory for better data management and user control. The application aims to enhance network performance and security while providing a user-friendly interface for network owners.

Uploaded by

amanvishwari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Network Traffic Analyzer

AAKASH KUMAR ( 2312000140019 )


Abstract
Networking, which is one of the most significant aspects of
information technology revolution, is developing increasingly day
after day. This is because it offers a huge amount of knowledge,
resources and human experiences. On the one hand, it contains a
considerable amount of harmful content, because of misusing. On
the other hand, sitting for a long time in front of PC’s or other
network-based devices can affect body badly. As enterprise
computing environments become more network-oriented, the
importance of network traffic monitoring and analysis intensifies.
Most existing traffic monitoring and analysis tools focus on
measuring the traffic loads of individual network segments.
Further, they typically have complicated user interfaces. This paper
introduces and presents the design an application and implementation
of an MS Windows-compatible software tool that is used to manage
networks usage and keep track of every network user activity. An
application consists of two parts client and server. The client side is a
background application runs whenever the PC is run, it turns off only
when the PC is turned off and launched with its startup. The server
side is more complex-GUI application that is responsible mainly for
receiving data sent by clients group, managing and updating data to
provide network owner up to date view. The effectiveness of an
application has been verified by applying it to an enterprise network
environment.
Existing System
 Most existing traffic monitoring and analysis tools focus on
measuring the traffic loads of individual network segments.

 The system uses exist networking protocols to communicate with


router, and other devices and control them remotely.

 Traffic measurement and analysis are crucial to the design,


operation and maintenance of wide-area networks based on Internet
Protocol.

 This measurement data is used for traffic engineering, performance


debugging, network operations, and to measure compliance with
performance targets.
Disadvantage of Existing System
 They require additional modern network traffic analysis tools in
order to manage network, solve the network problems quickly to
avoid network failure, and handle the network security.

 The decision tree (DT) is powerful and popular supervised machine


learning for decision-making and classification problems.

 Neural networks provide a solution to the problem of network


traffic prediction by applying numbers of techniques.
PROPOSED SYSTEM :
 This paper presents a review of several techniques proposed, used
and practiced for network traffic analysis and prediction.

 The graph based clustering algorithm is proposed for partition data


set into a number of clusters. They proposed rough set theory to
extract the relevant attributes from entire data set and for
classification.

 The objective of the proposed project here that it is designed an


application to help networks owners to control their networks in a
proper way by providing them necessary data and controlling
permissions over their clients.
ADVANTAGE
 The sensitivity and false positive rate metrics are applied to measure the
performances of algorithms.

 A number of current studies have reported that the SVM results of


giving higher performance with respect to classification accuracy than
the other classification approaches.

 The detection rate metric is presented to measure the performance of


rough set theory approach.

 They used positive rate, accuracy metrics at the training and testing
time to measure performance of their approaches.
TITLE AUTHOR DESCRIPTION
Large-scale network Bär, A., Finamore, A., The complexity of the
traffic monitoring with Casas, P., Golab, L., Internet has rapidly
DBStream, a system for & Mellia, M. (2014, increased, making it more
rolling big data analysis October). important and challenging
to design scalable network
monitoring tools.
Evaluating Efficiency Daadoo, M., We propose and analyze
of Multi-Layered Tarapiah, S., & layered switch
Switch Architecture in Atalla, S. (2016). architectures that possess
All-Optical Networks high design flexibility,
greatly reduced switch
size, and high
expandability.
TITLE AUTHOR DESCRIPTION
Searching of Daadoo, M., & While designing competitive
optimum Daraghmi, Y. switchboard, we should consider
characteristics of (2015, August). several services including the
multilayer switching possibility of authorization,
architecture in all- performance, number of ports,
optical networks encryption, data compression,
class of service (CoS) and quality
of service (QoS).
High speed network Fusco, F., & This work presents common
traffic analysis with Deri, L. (2010, pitfalls of network monitoring
commodity multi- November). applications when used with
core systems multi-core systems, and presents
solutions to these issues.
Block Diagram
SOFTWARE
REQUIREMENTS:

 Operating System : Windows 10


 Platform : DOT NET
TECHNOLOGY
 Front End : ASP.Net 4.0
 Back End : SQL SERVER 2014
HARDWARE
REQUIREMENTS:

 Keyboard
 Mouse
 Hard disk 500GB
 Ram 4 Gb
CONCLUSION
In this study of network management system, the proposed
approach is implementing a set of wellknown networking protocols
to find everything about them and monitor the full state of the
network. It is an efficient method that provides all needed
knowledge about network suitable way that optimizes the needed
owner interactions that is necessary to configure things as desired.
The solution is programmatically modeled by using a set of simple
and effective algorithmic techniques that manage client’s
communications do requests to the router pages, file transferring
and screen sharing with basic controlling. Moreover, the way in
which application designed improves user control efficiency when
using remote techniques, because of providing control of up to five
devices concurrently adjacent tabs that control devices by visiting
from remote sessions and windows remote connection utility, which
provides each remote session in an independent window that causes
difficulty in managing them by two remote sessions.
REFERENCE
 [1] Bär, A., Finamore, A., Casas, P., Golab, L., & Mellia, M. (2014, October). Large-
scale network traffic monitoring with DBStream, a system for rolling big data analysis.
In Big Data (Big Data), 2014 IEEE International Conference on (pp. 165-170). IEEE.

 [2] Daadoo, M., Tarapiah, S., & Atalla, S. (2016). Evaluating Efficiency of Multi-
Layered Switch Architecture in All-Optical Networks. International Journal of Applied
Engineering Research, 11(22), 11030-11036.

 [3] Daadoo, M., & Daraghmi, Y. (2015, August). Searching of optimum characteristics
of multilayer switching architecture in all-optical networks. In Heterogeneous
Networking for Quality, Reliability, Security and Robustness (QSHINE), 2015 11th
International Conference on (pp. 50-55). IEEE.

 [4] Fusco, F., & Deri, L. (2010, November). High speed network traffic analysis with
commodity multi-core systems. In Proceedings of the 10th ACM SIGCOMM
conference on Internet measurement (pp. 218-224). ACM.

 [5] Remote Desktop Protocol. Wikimedia Foundation, n.d. Web. 18 June 2016.
 6. I.Klevecka, Forecasting Network Traffic loads neural network and

Linear (ISSN 1407-5806, 2009) Vol.14, No.2 , pp.20-28.

 7. E. S. Yu, C.Y.R.Chen, Traffic Prediction Using Neural Networks (

IEEE , 1993) 0-7803-0917-0.

 8. T. Qin, X. Guan, W. Li, P.Wang, Monitoring Malicious Traffic

Flow Based on Independent Component Analysis, ( IEEE ,2009) 978-

1-4244-3434-3.

 9. G. Rutka, Some Aspects of Traffic Analysis used for Internet

Traffic Prediction (ISSN, 2009) 1392 – 1215.

 10. S. Chabaa1, A. Zeroual1, J. Antari1, Identification and Prediction

of Internet Traffic Using Artificial Neural Networks (scientific

research, 2010) 2, 147-155.

You might also like