• No results found

How To Monitor A Network With Spyware

N/A
N/A
Protected

Academic year: 2021

Share "How To Monitor A Network With Spyware"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

Spy Network Monitoring System With Hardware Detection

.

Mr.Sarang Tidke,Mr.Rohit Choudhary,Mr.Dipak Tembhare M.I.E.T Bhandara, M.I.E.T Bhandara, M.I.E.T Bhandara

Stidke158@gmail.com,crohit334@gmail.com.

A B S T R A C T

Spy network monitoring system is an application where one computer acts as a server in a lab or a networking cubical from where the authorized person or administrator can have all the access of it. The person or admin who handles a server can do many tasks on network computers which are connected to this server like-finding error on clients, sending messages to the clients that do illegal work or shut down the client systems. On the server side all the connected clients will be shown on the desktop. After showing icons on the server side, then the server get authorized and get all the details about particular clients and perform all the actions. Spy Network Monitoring allows you to check-in one, some or all users at once. This shows you whether they are doing what they are supposed to be doing. You can also watch keystrokes as they happen! These features allow admin to effectively watch all users’ actions with detect hardware part in real time.

I. INTRODUCTION

Spy network monitoring is used to monitor and control the client machines in the network. It allows the

administrator to view the systems connected to the LAN. The system information contains OS name version, and Processor details. It is capable of storing login details of the user. It can also monitor the data send by the user. It can share the desktop screen of the users also. The project Spy network monitoring is an application which needs to be installed in the server. The computers are connected in a LAN. The computers are recognized by their computer names and by their IP address.

This network monitoring software gives a supervisor or administrator the tools they need to monitor and filter employee or student PC activity. SNM also boasts unique remote control tools including the ability to fully control and use any PC all from the comfort of the admin own workstation.SNM runs in total stealth and is hidden within the Application Task List in Task Manager. No icons or other traces of the software will be displayed on the desktop or start menu. The network administrator can connect and monitor any machine in total stealth.

The Network Monitoring section has two different types of features.

1. ‘Live Monitoring’:- Certain functions can be performed live too instantly “check-up” on a user. 2. ‘Logged Monitoring’:- which captures specific activity and stores it for later viewing.

II. LITERATURE SURVEY

A. Standard Control’s Used In The Project

These controls are the Web equivalents of the tools that you encounter when using Windows applications. Web pages that include these controls have that standard application feel that we‘re all familiar with, so the process of adding them to pages is quick and simple. Here are some of the most commonly used controls:

(2)

1. Packet Sniffing

For most organizations, packet sniffing is largely an internal threat. A third party on the Internet, for instance, could not easily use packet sniffing software to eavesdrop on traffic on a corporate LAN. Packet sniffing in a switched environment is possible — anyone equipped with a laptop may be able to monitor communication between machines on a switched network. In a switched environment, it is more of a challenge to eavesdrop on network traffic.

2. Spyware

The end of the network-enabled applications that are installed on an end user‘s system without the knowledge or permission of the IT department, or frequently use without the knowledge or permission of the end users themselves. They are further categorized by the degree of evasiveness they exhibit on the network. for example how much use they make of techniques such as port agility and encryption to avoid detection by existing network security controls.

III. PROPOSED SYSTEM

A. Problem Definition

• Monitoring of your employees may not seem to be an appropriate way to find out things happening at your work place. But then what is the other way round. It’s your company and you have the right to know what’s going on and have complete security for your confidential data. But your employees too have a right to privacy or they do not?

• Several discussions have been carried out on the privacy rights of employees and monitoring authority of employers. Such discussions always raise the question of what an employer should do to stop personal, illegal activities and increase productivity at work place and what benefits are permitted to an employee at his work place.

• Employee’s right to privacy in the workplace is very limited. In general, you have an established right to monitor employee telephone calls, computer content, voice mail and e-mails. Companies employ restrictions like proxy servers, firewalls to avoid situations like e—mail, chat conversations, transfer of confidential data which can lead to financial and image loss to the company.

• Human supervisory methods are employed to stop acts of confidential data and information transfer through emails, chat conversations, FTP protocols, network transfers, and USB drives. But human measures also fail due to absenteeism of supervisors or it is not possible to supervise large number of employees at a time.

• It becomes the need of the employers to supervise their employees so as to maintain employee efficiency. Efficiency reduces due to misuse of work hours by employees on tasks not related to their work. Harassment and discrimination conducted by the use of technology, security of confidential information and the leak of news and upcoming events among competitors occur due to insufficient protective measures adopted by any company.

(3)

meaningful for the organization.

• If you intend to monitor employees’ phone calls, e-mails, websites visited, you should develop a policy on monitoring before you implement it so that employees know .

B. Research Methodology

1. Standard Controls used in the Project

These controls are the Web equivalents of the tools that you encounter when using Windows applications. Web pages that include these controls have that standard application feel that we‘re all familiar with, so the process of adding them to pages is quick and simple. Here are some of the most commonly used controls.

2. Toolbox

Visual Web Developer offers the set of ASP.NET server- side controls in a Toolbox for easy drag-and-drop onto the page. The Toolbox can be displayed by choosing Menu➪View➪Toolbox or by pressing Ctrl+Alt+X. When the Toolbox is displayed, you can move it to a new location on the screen by dragging its title bar. The Toolbox is organized into several panels that group similar controls. The panels can be expanded to show their tools or collapsed to save space.

3. Advantages

• Live Monitoring will be done from the administrative on pc.

• Monitoring is done using hidden camera.

• Live monitoring screen for administrator.

• Administrator can also see single remote desktop for multiple client machine.

4. Mobility model

a. LOGIN/ REGISTRATION

This is a module mainly designed to provide the authority to a user in order to access the other modules of the project. Here a user can have the accessibility authority after the registration.

b. DATA TRANSFER

This module is mainly designed to transfer data from admin to employees. The same module can also be used for illegal data transfer from authorized to employees to other employees

(4)

Figure 1.Architecture Representation Of Spyware Model

Figure 2 Data Flow Diagram

(5)

5. Hardware Detection

1. Define remote interface

2. Developed remote object by implementing remote interface. 3. Developed client program.

4. Compile source file.

5. Generate client stub and server scaleton. 6. Start the RMI registry.

7. Start the remote server object. 8. Run the client.

IV. CONCLUSION

This project proved good for me as it provided practical knowledge of not only programming in ASP.NET and C#. NET web based application and know some extent Windows Application and SQL Server, but also about all handling procedure related with SPY Monitoring System. This project has more scope in the future. It also provides knowledge about the latest technology used in developing web enabled application and client server technology that will be great demand in future. This will provide better opportunities and guidance in future in developing projects independently.

V. REFERENCES

[1] 1. P.Calyam, W.Mandrawa, M.Sridharan, A.Khan, P.Schopis, ”H.323 Beacon: An H.323 application related end- to-end performance troubleshooting tool”, ACM SIGCOMM NetTs, 2004.

[2] Multicast Beacon - http://dast.nlanr.net/Projects/Beacon

[3] A. Tirumala, L. Cottrell, T. Dunigan, ”Measuring end-to-end bandwidth with Iperf using Web100 ”, Passive and Active Measurement Workshop, 2003.

[4] A. Downey, ”Using Pathchar to estimate Internet link charac- teristics”, ACM SIGCOMM, 1999.

[5] C. Dovrolis, P. Ramanathan, D. Morre, ”Packet Dispersion Techniques and Capacity Estimation”, IEEE/ACM Transac- tions on Networking, 2004.

[6] 6. L. Cottrell, C. Logg, I. Mei, ”Experiences and results from a new high performance network and application monitoring toolkit”, Passive and Active Measurement Workshop, 2003.

[7] M.Luckie, A.McGregor,”IPMP:IPMeasurementProtocol”, Passive and Active Measurement Workshop, 2002.

Author Profiles

Mr.Sarang Rameshji Tidke persuing B.E. degree course from MIET, Bhandara.

References

Related documents

Multi-port in-line taps offer extended visibility for any monitoring or analysis device by providing a single attach point with visibility to multiple locations on the

The SNMP client scans the network to find existing devices and sets up the SNMP objects to be monitored automatically, so that the administrator doesn’t even have to think about

download of cell-control spy software computer online monitoring and automation download i- spy software performance monitor sql cluster remote control cars for $10 ming network

The functions of the Discovery Broker include: (i) Service (Un)Registering: Listens for requests from potential Service Providers, and accordingly adds/removes services to/from

B andwidth Monitoring Tool refers to an application program that analyses the network traffic, and generates a report about the amount of data flowing through the

Many variables have been tested for the different categories to explain the phenomenon, among which are: gender, course average, year (student-related characteristics); class

A Kerberos authentication provider can be used to authenticate users accessing SAP HANA in the following ways: ● Directly from ODBC and JDBC database clients within a network

Department of Energy (DOE) Health Physics Program • To understand medical personnel and patient radiation.. safety risks as compared to those risks at a