NETWORK TRAFFIC ARE NORMALLY DETECTIVE
One recent trend in network security attacks is an increasing number of indirect attacks which influence network traffic negatively, instead of directly entering a system and damaging it. In future, damages from this type of attack are expected to become more serious. In addition, the bandwidth consumption by these attacks influences the entire network performance. This paper presents an abnormal network traffic detecting method and a system prototype. By aggregating packets that belong to the identical flow, we can reduce processing overhead in the system. We suggest a detecting algorithm using changes in traffic patterns that appear during attacks. This algorithm can detect even mutant attacks that use a new port number or changed payload, while signature-based systems are not capable of detecting these types of attacks. Furthermore, the proposed algorithm can identify attacks that cannot be detected by examining only single packet information.
In computer networking, network traffic control is the process of managing, controlling or reducing the network traffic, particularly Internet bandwidth, e.g. by the network scheduler. It is used by network administrators, to reduce congestion, latency and packet loss. This is part of bandwidth management. In order to use these tools effectively, it is necessary to measure the network traffic to determine the causes of network congestion and attack those problems specifically.
CHAPTER ONE
1.0 INTRODUCTION
Network data in computer networks is mostly encapsulated in network packets, which provide the load in the network. Network traffic is the main component for network traffic measurement and network traffic control.
- Network traffic control - managing, prioritising, controlling or reducing the network traffic
- Network traffic measurement - measuring the amount and type of traffic on a particular network
- Traffic generation model - is a stochastic model of the traffic flows or data sources in a communication computer network.
Proper analysis of network traffic provides the organization with the network security as a benefit - unusual amount of traffic in a network is a possible sign of an attack. Network traffic reports provide valuable insights into preventing such attacks.
Traffic volume is a measure of the total work done by a resource or facility, normally over 24 hours, and is measured in units of erlang-hours. It is defined as the product of the average traffic intensity and the time period of the study.
Traffic volume = Traffic intensity × time
A traffic volume of one erlang-hour can be caused by two circuits being occupied continuously for half an hour or by a circuit being half occupied (0.5 erlang) for a period of two hours. Telecommunication operators are vitally interested in traffic volume, as it directly dictates their revenue.
1.2 OBJECTIVE OF THE STUDY
The objective of this work is to discuss on the network traffic detective which is a network traffic analysis tool that allows tracking Internet activity of the network users. It doesn’t require installing any additional software on users’ PCs; the only thing you’ll need is to share the same network (LAN) as the users being monitored
1.3 SIGINIFICANCE OF THE STUDY
This work is on device depassively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits.
1.4 SCOPE OF THE PROJECT
Detective stands out from its competition by being able to intercept and log data as it is transferred by high-level network protocols. Detective as compared with other network traffic analyzers and sniffers, uses Deep Packet Inspection (DPI) technology to detect malicious traffic and illicit network activity. Detective is able to reconstruct TCP/IP sessions and perform deep-analysis of application-level protocols to ensure no malicious activity or intent is concealed within high-traffic volumes. At the same time, Detective is able to restore and record transferred data in its original format without interrupting connection speed or interfering in user experience with latency issues.
A good program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by the network's firewall, intrusion detection system, antivirus software and spyware-detection program.
1.5 APPLICATION OF THE STUDY
This material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We make abstract and chapter one visible for everyone.
All Project Topics on this site have complete 5(five) Chapters . Each Project Material include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.
To "DOWNLOAD" the complete material on this particular topic above click "HERE"
Do you want our Bank Accounts? please click HERE
To view other related topics click HERE
To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE
Do you want us to research for your new topic? if yes, click "HERE"
Do you have any question concerning our post/services? click HERE for answers to your questions
For more information contact us through Any of the following means:
Mobile No :+2348146561114 or +2347015391124
Email address :engr4project@gmail.com
Watsapp No :+2348146561114
IF YOU ARE SATISFIED WITH OUR SERVICES, PLEASE DO NOT FORGET TO INVITE YOUR FRIENDS AND COURSEMATES TO OUR PAGE.