You are on page 1of 10

VIRTUAL NETWORK MONITORING SYSTEM

Virtual Network Monitoring Syste ! The demand for cost and time saving technologies in combination with competitive pressures within corporate environments has made VPN (Virtual Private Network) technology an alternative option for enterprise network connectivity. However the amount of available information and the speed at which technical landscapes are changing !uickly outpaces typical VPN solutions being developed. "apid development and abundant options create comple#ity for network designers with respect to choosing and implementing the proper VPN technology.

V$"T%&' N(T)*"+ ,*N$T*"$N- ./.T(, is a 0ava tool to observe network traffic virtually. Network administrators facilitate to monitor VPN (PPTP 1 $P.ec 1 ..H) and ..' (HTTP.) connectivity of wire line1wireless networks. The graphical representation makes it easy to visuali2e messages being sent between computer nodes. %sers can also read messages not of the above types in plain te#t. 3onnection statistics can be used as a measure of network security. The P"* edition allows network administrators to monitor multiple and remote networks.

Mo"ules!
#a$turing %a&kets 4y choosing a network card can capture packets from the network.$t will list out all the network devices in the system when we select one of those devices this application will capture all the packets coming form that device. 'rawing #onne&tions $n the network traffic visuali2ation VPN and ..' connections are represented in colors other than black. )hen the packets are captured from the

network card then it will captures all the $P addresses of the systems which are connected in the network. %lotting Network (ach message captured by V$"T%&' )&T3H ./.T(, is represented graphically by an edge connecting two computers. .ince messages are sent both ways when a message is passing from one system to another system then a edge connecting those two computers are drown dynamically. 'u $ing Te(t &ll messages not sent through VPN nor ..' are printed onto the screen. The latest arriving message will be appear at the top of the table. 5ifferent filters will be developed to locate messages containing sensitive information. #olle&ting Statisti&s 5ynamic updating of the statistics table. The statistics table collects the fractions of secure connections and packets in the network. $t will represent all the information how many packets are transferred in the subnet. Resol)ing I% A""ress! V$"T%&' )&T3H ./.T(, will support the functionalities of resolving $P addresses to hostnames depending on the capturing device. Set *ilters! 4y this application the system administrator is provided with the filters for the data security and graphical representation makes easy to the administrator to identify how many systems are connected and how many are active at present.

Intro"u&tion
This white paper reviews several important design issues that should be considered when evaluating Virtual Private Network (VPN) technology. Today each network manager is responsible for a network that differs from other networks as much as individual people differ from one another. This uni!ueness invariably causes issues when designing a VPN. VPN technology is one of the most integrated technologies being deployed on today6s networks. (very VPN solution interacts with e#isting sub7systems and crosses all business and operational practices. 4ased on their specific e#posure and technological predispositions people6s perceptions of VPN technologies differ significantly. The demand for cost and time saving technologies in combination with competitive pressures within corporate environments has made VPN technology an alternative option for enterprise network connectivity. However the amount of available information and the speed at which technical landscapes are changing !uickly outpaces typical VPN solutions being developed. "apid development and abundant options create comple#ity for network designers with respect to choosing and implementing the proper VPN technology. &t present many vendors6 VPN solutions are closer to using common practices but interoperability issues with non7standards7based solutions create awkward manageability issues. 3ommon practices used to configure control and monitor must be ree#amined during the design of a VPN. The goal of a successful VPN is to provide authenticated and authori2ed nodes with proper access to trusted networks in a seamless and automated fashion. This interaction must include client7to7client client7to7gateway or gateway7to7gateway connections. & VPN solution must provide centrali2ed management reliable service and ensure the integrity and privacy of data transfers. These goals must be accomplished when traversing either a public or private network infrastructure

+,- %ur$ose
The purpose of this document is to give the overview of the pro8ect. The main aim of this pro8ect is to observe network traffic virtually. Network administrators facilitate to monitor VPN (PPTP 1 $P.ec 1 ..H) and ..' (HTTP.) connectivity of wire line1wireless networks. The graphical representation makes it easy to visuali2e messages being sent between computer nodes. %sers can also read messages not of the above types in plain te#t. 3onnection statistics can be used as a measure of network security. The P"* edition allows network administrators to monitor multiple and remote networks. Virtual Network ,onitoring .ystem will focus on number of functionalities for monitoring network traffic and security.

+,.. O)er)iew
V$"T%&' N(T)*"+ ,*N$T*"$N- ./.T(, is a 0ava tool to observe network traffic virtually. Network administrators facilitate to monitor VPN (PPTP 1 $P.ec 1 ..H) and ..' (HTTP.) connectivity of wire line1wireless networks. The graphical representation makes it easy to visuali2e messages being sent between computer nodes. %sers can also read messages not of the above types in plain te#t. 3onnection statistics can be used as a measure of network security. The P"* edition allows network administrators to monitor multiple and remote networks.

,ain functional features of the Virtual )atch .ystem on Private Networks 9.:.; 9.:.: 9.:.9 9.:.< 3apturing Packets 5rawing 3onnections Plotting Network 5umping Te#t

9.:.= 3ollecting .tatistics 9.:.> "esolving $P &ddresses

/,0, Syste
/,-,

Analysis

E(isting Syste

Restri&te" A&&ess to 'esira1le Ser)i&es A firewall may well restrict certain inherently dangerous services which users of the protected network nevertheless want to use. Services for which proxy servers do not (yet) exist will effectively be blocked by proxy firewalls; newer services such as WA S were not designed to work with firewalls and! by their very newness! are considered to be unsafe . "ompromises by the designers of the security policy may be necessary in order to prevent the users from circumventing the firewall completely. 'e&rease in T2roug2$ut #irewalls may represent a significant bottleneck in communication between the protected network and the outside world. $owever! this is less of a problem than is generally assumed! as most firewalls can pass data at %& rates (&.' mpbs)! while most sites are connected at rates less than %&. #on&entrate" Se&urity While having security concentrated on one host has its advantages! a compromise of the firewall could be disastrous to hosts which are not running their own security software. %he (uestion is whether a more

likely! but smaller! security breach is better or worse than a less likely large breach. #o $li&an&y )oth users and management may tend to become complacent about security when a firewall is installed. nvesting time and money in a firewall is not particularly useful if other methods for stealing data or attacking systems are neglected. *ser security education is essential! since legitimate users are already inside the protected network. +hysical security is also often neglected , implementing the most powerful firewalls and having the most carefully designed security policy is useless if someone can simply walk off with the server.

/,.,

%ro$ose" syste

-ur proposed system is .irtual /etwork 0onitoring System!as the popularity of the nternet grew! businesses turned to it as a means of extending their own networks. #irst came intranets! which are password,protected sites designed for use only by company employees. /ow! many companies are creating their own VIRTUAL NETWORK MONITORING SYSTEM(virtual private network) to accommodate the needs of remote employees and distant offices. )asically! a . 1%*A2 /3%W-14 0-/ %-1 /5 is a private network that uses a public network (usually the nternet) to connect remote sites or users together. nstead of using a dedicated! real,world connection such as leased line! a . 1%*A2 /3%W-14 uses 6virtual6 connections routed through the nternet from the company7s private network to the remote site or employee. n this article! you will gain a fundamental

understanding of . 1%*A2 /3%W-1k8s! and learn about basic . 1%*A2 /3%W-14 components! technologies! tunneling and security.

%here are two common types of . 1%*A2 /3%W-14 Re

ote!a""ess!

also called a virtual private #ial!up network (V$%N)! is a user,to, 2A/ connection used by a company that has employees who need to connect to the private network from various remote locations. %hrough the use of dedicated e(uipment and large,scale encryption! a company can connect multiple fixed sites over a public network such as the nternet. Site,to,site . 1%*A2 /3%W-14 0-/ %-1 /5 S9S%30 can be one of two types:

Intranet!&ase# ,

f a company has one or more remote

locations that they wish to ;oin in a single private network! they can create an intranet . 1%*A2 /3%W-14 to connect 2A/ to 2A/. E'tranet!&ase# , When a company has a close relationship with another company (for example! a partner! supplier or customer)! they can build an extranet . 1%*A2 /3%W-14 that connects 2A/ to 2A/! and that allows all of the various companies to work in a shared environment A well,designed . 1%*A2 /3%W-14 uses several methods for keeping your connection and data secure:

#irewalls 3ncryption +Sec AAA Server

/,+, Mo"ules O3 T2e %ro"u&t


There are basically five modules for developing #a$turing %a&kets 4y choosing a network card can capture packets from the network.$t will list out all the network devices in the system when we select one of those devices this application will capture all the packets coming form that device. 'rawing #onne&tions $n the network traffic visuali2ation VPN and ..' connections are represented in colors other than black. )hen the packets are captured from the network card then it will captures all the $P addresses of the systems which are connected in the network. %lotting Network (ach message captured by V$"T%&' )&T3H ./.T(, is represented graphically by an edge connecting two computers. .ince messages are sent both ways when a message is passing from one system to another system then a edge connecting those two computers are drown dynamically.

'u $ing Te(t &ll messages not sent through VPN nor ..' are printed onto the screen. The latest arriving message will be appear at the top of the table. 5ifferent filters will be developed to locate messages containing sensitive information.

#olle&ting Statisti&s 5ynamic updating of the statistics table. The statistics table collects the fractions of secure connections and packets in the network. $t will represent all the information how many packets are transferred in the subnet.

Resol)ing I% A""ress! V$"T%&' )&T3H ./.T(, will support the functionalities of resolving $P addresses to hostnames depending on the capturing device.

4,0, O$erating En)iron ent


4,- 5AR'WARE S%E#I*I#ATIONS! Processor Name Processor .peed ? Pentium7$$$ ? >@@ ,HA

"&, Hard 5isk 3apacity

? :=> ,4 ? :B -4

4,. SO*TWARE S%E#I*I#ATIONS! &pplication 'anguage 'ibraries *perating .ystem ? 0&V& ;.<.C ? ? 0P3&P )$NP3&P )$N5*). :BBB P"*D(..$*N&'

You might also like