34

Presentation 1

Embed Size (px)

Citation preview

Page 1: Presentation 1
Page 2: Presentation 1
Page 3: Presentation 1

INTRODUCTION

• Network Packet Sniffer is a system that not only detects the intruder IP address it detects even with its content also.

• It is used to sniff out Network Packets.• It helps to increase packet throughput as

inspecting every packet can slow traffic considerably.

• The proposed system can be used to attain information relating to network.

Page 4: Presentation 1

FEATURES

System Proposed can be used to attain information relating to network.

It can be used to retrieve information about the current systems in the network.

System is used to monitor currently active machines in the network and with that admin can logoff and logon system from server machine.

Page 5: Presentation 1

EXISTING SYSTEM

Here existing packet sniffer tool can capture all of the traffic passing by computer.

If it is of wireless network the packet sniffer may record everything the person do and everything everyone else on wireless network does online without their concert.

One way to avoid is recording third party communication tool is avoid using promiscuous mode.

Page 6: Presentation 1

DRAWBACKS

It does not provide proper security.It needs manual process to stop the

intruder.Admin should be all the time in

front of system.Cannot ensure whether the packet

sent or received at the destination.

Page 7: Presentation 1

PROPOSED SYSTEM

It is done by using JAVA/J2EE as front end and SQL as back end.

Here firewalls plays a major role in blocking the intruder with respective of registered DB.

Here the proposed system is finding the intruder and block them.

Page 8: Presentation 1

BENEFITS

User Friendly Ease of accessFast RetrievalsSingle point system administration and

maintenance.Added security to system.Can be implemented in network.

Page 9: Presentation 1

System Design

INPUT DESIGN• Login form• Change password• Pattern registration

form• Intruder Alteration

Form

OUTPUT DESIGN• Intruder details

display form• TCP sniffing form• UDP sniffing form• All packet sniffing

form

Page 10: Presentation 1

SYSTEM SPECIFICATION

HARD SPECIFICATION PROCESSOR : Intel Pentium IV 1.8 GHz

RAM : 256MB SD RAM

HARD DISK DRIVES : 4 GB

FLOPPY DISK DRIVES : 1.44 MB

MONITOR : 15” Color Monitor

KEYBOARD : Multimedia Keyboard

MOUSE : Logitech Mouse

Page 11: Presentation 1

SOFTWARE SPECIFICATION

Platform : Windows 2000/XP

Environment : Java

Database : MS-SQL

Third Party Tool : JPCap & WinPCap

Page 12: Presentation 1

Transform

Monitor

Administrator

Intruder

MonitoringAdaptiveModel

Name

PasswordUser_id

address

ContentsPacket_no

portPacket add

Admin_id

PasswordName

ENTITY RELATIONSHIP DIAGRAM FOR NPS

Page 13: Presentation 1

SYSTEM DEVELOPMENT MODULES

Login Module

Packet Capture Module

Packet Parser Module

Packet Analyzer Module

User Interface Module

Page 14: Presentation 1

LOGIN MODULE

This module is the entry module

In this module user is allowed to create

admin account and their credentials will

be checked before accessing the tool

Page 15: Presentation 1

Packet Capture Module

It integrates with library WinCap and provide a method to investigate the packet.

It refers to the act of recording network traffic and saving this data to a file.

Packet sniffer may record everything user o with the wireless network on-line.

FILTERS It is required to filter unwanted data and

breakdown the file size

Page 16: Presentation 1

Packet Parser Module

This Module will parse the packet header and identify details.

Accurate parser is a professional tool for monitoring n/w traffic of the PC&IP packets.

Packet parser allows he user to parse ,display record & analyze all the data exchanges with n/w via IP connections

Page 17: Presentation 1

Packet Analyzer Module

Packet analyzer will analyze the captured data and display in formatted fashion.

User Interface Module

This module have user interface & method to trigger actions based on user request

Page 18: Presentation 1

USE CASE DIAGRAMAdmin

lock application

register intruder

alter intruder

remove intruder

change password

alter client

remove client

login

register clientAdmin

chat server

client

Page 19: Presentation 1

SEQUEUENCE DIAGRAM

: client

login database

request for registration

enter userid&password

userid&password

retrieve userid &password

validate userid&password

login result

requst to change reg contents

if yes

change the contents

changes done

remove the client

remove client

client removed

Page 20: Presentation 1

: sniffing

network

read the TCP packets from the network

display captured TCP packets with src&des details

read the UDP packets from the network

display captured UDP packets with src&des details

read the TCP&UDP packets from the network

display captured TCP&UDP packets

read the data from the packets captured

display the detected data

Page 21: Presentation 1

SAMPLE CODE

Client login package sniffer; import java.io.*; import java.net.*; import java.awt.*; import javax.swing.*; import java.util.*; public class ClientLogin extends JFrame { Socket cs; String message,name; InputStream ips; OutputStream ops; byte bt[]; boolean flag; String msg[] = new String[100]; Thread t; Client c; public ClientLogin() { } public ClientLogin(Client c) { initComponents(); this.c = c; c.setVisible(false); setTitle("Login Screen"); }

Page 22: Presentation 1

. private void initComponents() {   Login = new javax.swing.JButton(); Cancel = new javax.swing.JButton(); val = new javax.swing.JLabel(); User = new javax.swing.JTextField(); Pass = new javax.swing.JPasswordField(); jLabel2 = new javax.swing.JLabel(); jLabel3 = new javax.swing.JLabel();  

setDefaultCloseOperation(javax.swing.WindowConstants.DISPOSE_ON_CLOSE);

Page 23: Presentation 1

. setResizable(false);   Login.setFont(new java.awt.Font("Tahoma", 1, 12)); Login.setForeground(new java.awt.Color(51, 0, 51)); Login.setText("Login"); Login.addActionListener(new java.awt.event.ActionListener() { public void actionPerformed(java.awt.event.ActionEvent evt)

{ LoginActionPerformed(evt); } });

Page 24: Presentation 1
Page 25: Presentation 1
Page 26: Presentation 1
Page 27: Presentation 1
Page 28: Presentation 1
Page 29: Presentation 1
Page 30: Presentation 1

.

Page 31: Presentation 1

CONCLUSION…..

Page 32: Presentation 1

REFERENCES

•Patrick Naughton, Herbert Schildt “COMPLETE REFERENCE JAVA2”, Tata McGraw hill Publishing Ltd, 1999.

•Richard Farly “SOFTWARE ENGINEERING CONCEPTS”

•Ragu Ramakrishnan, Johannes Gehrke “DATABASE MANAGEMENT SYSTEMS” McGraw hill Publishing Ltd.•Deitel and Deitel “JAVA, HOW TO PROGRAM”, Pearson Publishers & Distributors Pvt Ltd, 1999.

Page 33: Presentation 1
Page 34: Presentation 1