Network Traffic Analyzer
AAKASH KUMAR ( 2312000140019 )
Abstract
Networking, which is one of the most significant aspects of
information technology revolution, is developing increasingly day
after day. This is because it offers a huge amount of knowledge,
resources and human experiences. On the one hand, it contains a
considerable amount of harmful content, because of misusing. On
the other hand, sitting for a long time in front of PC’s or other
network-based devices can affect body badly. As enterprise
computing environments become more network-oriented, the
importance of network traffic monitoring and analysis intensifies.
Most existing traffic monitoring and analysis tools focus on
measuring the traffic loads of individual network segments.
Further, they typically have complicated user interfaces. This paper
introduces and presents the design an application and implementation
of an MS Windows-compatible software tool that is used to manage
networks usage and keep track of every network user activity. An
application consists of two parts client and server. The client side is a
background application runs whenever the PC is run, it turns off only
when the PC is turned off and launched with its startup. The server
side is more complex-GUI application that is responsible mainly for
receiving data sent by clients group, managing and updating data to
provide network owner up to date view. The effectiveness of an
application has been verified by applying it to an enterprise network
environment.
Existing System
Most existing traffic monitoring and analysis tools focus on
measuring the traffic loads of individual network segments.
The system uses exist networking protocols to communicate with
router, and other devices and control them remotely.
Traffic measurement and analysis are crucial to the design,
operation and maintenance of wide-area networks based on Internet
Protocol.
This measurement data is used for traffic engineering, performance
debugging, network operations, and to measure compliance with
performance targets.
Disadvantage of Existing System
They require additional modern network traffic analysis tools in
order to manage network, solve the network problems quickly to
avoid network failure, and handle the network security.
The decision tree (DT) is powerful and popular supervised machine
learning for decision-making and classification problems.
Neural networks provide a solution to the problem of network
traffic prediction by applying numbers of techniques.
PROPOSED SYSTEM :
This paper presents a review of several techniques proposed, used
and practiced for network traffic analysis and prediction.
The graph based clustering algorithm is proposed for partition data
set into a number of clusters. They proposed rough set theory to
extract the relevant attributes from entire data set and for
classification.
The objective of the proposed project here that it is designed an
application to help networks owners to control their networks in a
proper way by providing them necessary data and controlling
permissions over their clients.
ADVANTAGE
The sensitivity and false positive rate metrics are applied to measure the
performances of algorithms.
A number of current studies have reported that the SVM results of
giving higher performance with respect to classification accuracy than
the other classification approaches.
The detection rate metric is presented to measure the performance of
rough set theory approach.
They used positive rate, accuracy metrics at the training and testing
time to measure performance of their approaches.
TITLE AUTHOR DESCRIPTION
Large-scale network Bär, A., Finamore, A., The complexity of the
traffic monitoring with Casas, P., Golab, L., Internet has rapidly
DBStream, a system for & Mellia, M. (2014, increased, making it more
rolling big data analysis October). important and challenging
to design scalable network
monitoring tools.
Evaluating Efficiency Daadoo, M., We propose and analyze
of Multi-Layered Tarapiah, S., & layered switch
Switch Architecture in Atalla, S. (2016). architectures that possess
All-Optical Networks high design flexibility,
greatly reduced switch
size, and high
expandability.
TITLE AUTHOR DESCRIPTION
Searching of Daadoo, M., & While designing competitive
optimum Daraghmi, Y. switchboard, we should consider
characteristics of (2015, August). several services including the
multilayer switching possibility of authorization,
architecture in all- performance, number of ports,
optical networks encryption, data compression,
class of service (CoS) and quality
of service (QoS).
High speed network Fusco, F., & This work presents common
traffic analysis with Deri, L. (2010, pitfalls of network monitoring
commodity multi- November). applications when used with
core systems multi-core systems, and presents
solutions to these issues.
Block Diagram
SOFTWARE
REQUIREMENTS:
Operating System : Windows 10
Platform : DOT NET
TECHNOLOGY
Front End : ASP.Net 4.0
Back End : SQL SERVER 2014
HARDWARE
REQUIREMENTS:
Keyboard
Mouse
Hard disk 500GB
Ram 4 Gb
CONCLUSION
In this study of network management system, the proposed
approach is implementing a set of wellknown networking protocols
to find everything about them and monitor the full state of the
network. It is an efficient method that provides all needed
knowledge about network suitable way that optimizes the needed
owner interactions that is necessary to configure things as desired.
The solution is programmatically modeled by using a set of simple
and effective algorithmic techniques that manage client’s
communications do requests to the router pages, file transferring
and screen sharing with basic controlling. Moreover, the way in
which application designed improves user control efficiency when
using remote techniques, because of providing control of up to five
devices concurrently adjacent tabs that control devices by visiting
from remote sessions and windows remote connection utility, which
provides each remote session in an independent window that causes
difficulty in managing them by two remote sessions.
REFERENCE
[1] Bär, A., Finamore, A., Casas, P., Golab, L., & Mellia, M. (2014, October). Large-
scale network traffic monitoring with DBStream, a system for rolling big data analysis.
In Big Data (Big Data), 2014 IEEE International Conference on (pp. 165-170). IEEE.
[2] Daadoo, M., Tarapiah, S., & Atalla, S. (2016). Evaluating Efficiency of Multi-
Layered Switch Architecture in All-Optical Networks. International Journal of Applied
Engineering Research, 11(22), 11030-11036.
[3] Daadoo, M., & Daraghmi, Y. (2015, August). Searching of optimum characteristics
of multilayer switching architecture in all-optical networks. In Heterogeneous
Networking for Quality, Reliability, Security and Robustness (QSHINE), 2015 11th
International Conference on (pp. 50-55). IEEE.
[4] Fusco, F., & Deri, L. (2010, November). High speed network traffic analysis with
commodity multi-core systems. In Proceedings of the 10th ACM SIGCOMM
conference on Internet measurement (pp. 218-224). ACM.
[5] Remote Desktop Protocol. Wikimedia Foundation, n.d. Web. 18 June 2016.
6. I.Klevecka, Forecasting Network Traffic loads neural network and
Linear (ISSN 1407-5806, 2009) Vol.14, No.2 , pp.20-28.
7. E. S. Yu, C.Y.R.Chen, Traffic Prediction Using Neural Networks (
IEEE , 1993) 0-7803-0917-0.
8. T. Qin, X. Guan, W. Li, P.Wang, Monitoring Malicious Traffic
Flow Based on Independent Component Analysis, ( IEEE ,2009) 978-
1-4244-3434-3.
9. G. Rutka, Some Aspects of Traffic Analysis used for Internet
Traffic Prediction (ISSN, 2009) 1392 – 1215.
10. S. Chabaa1, A. Zeroual1, J. Antari1, Identification and Prediction
of Internet Traffic Using Artificial Neural Networks (scientific
research, 2010) 2, 147-155.