Work Traffic Monitoring Analysis System
Work Traffic Monitoring Analysis System
net/publication/319329758
CITATIONS READS
0 4,747
1 author:
Motaz Daadoo
Palestine Technical University- Kadoorie
23 PUBLICATIONS 75 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Motaz Daadoo on 29 August 2017.
Motaz Daadoo
Department of Computer Systems Engineering
Palestine Technical University - Kadoorie (PTUK), Tulkarm, Palestine
P.O. Box 7 Tulkarm City, Palestine
E-mail: [email protected]
Tel: +972-9-2688175; Fax: +972-2-2677922
Abstract
Networking, which is one of the most significant aspects of information technology
revolution, is developing increasingly day after day. This is because it offers a huge amount
of knowledge, resources and human experiences. On the one hand, it contains a
considerable amount of harmful content, because of misusing. On the other hand, sitting for
a long time in front of PC’s or other network-based devices can affect body badly. As
enterprise computing environments become more network-oriented, the importance of
network traffic monitoring and analysis intensifies. Most existing traffic monitoring and
analysis tools focus on measuring the traffic loads of individual network segments. Further,
they typically have complicated user interfaces. This paper introduces and presents the
design an application and implementation of an MS Windows-compatible software tool
that is used to manage networks usage and keep track of every network user activity. An
application consists of two parts client and server. The client side is a background-
application runs whenever the PC is run, it turns off only when the PC is turned off and
launched with its startup. The server side is more complex-GUI application that is
responsible mainly for receiving data sent by clients group, managing and updating data to
provide network owner up to date view. The effectiveness of an application has been
verified by applying it to an enterprise network environment.
1. Introduction
As enterprise computing environments become more network-oriented, the importance of network
traffic monitoring and analysis intensifies. Most existing traffic monitoring and analysis tools focus on
measuring the traffic loads of individual network segments. Further, they typically have complicated
user interfaces [Daadoo, M., Tarapiah, S., & Atalla, S. (2016), Evaluating], [Daadoo, M., & Daraghmi,
Y., (2015), Searching].
The objective of the proposed project here that it is designed an application to help networks
owners to control their networks in a proper way by providing them necessary data and controlling
permissions over their clients. If also aims to optimize accessibility and usability of control by
providing a collection of variable demands. This work is done using three main well-known network
protocols, which are TCP, RDP (Remote Desktop Connection Protocol) and HTTP. The first one is
used to achieve reliable transmission of clients running apps, IPs, MACs and snapshots. The second
79
European Journal of Social Sciences – Volume 54, Issue 1 January (2017)
one, which is RDP, is used to give server-part full control of wanted clients. The third one is used for
communication with router to introduce more control privileges[Bär, A, et al., (2014)], [Fusco, F, et al.,
(2010)].
The proposed system consists of two parts: client and server. The client side is a background-
application runs whenever the PC is run, it turns off only when the PC is turned off and launched with
its startup. It contains set of classes built to provide information about client’s status presented by: its
basic access information (MAC and IP) addresses, a list of running applications and on-demand live
snapshots. Firstly, the server side is more complex-GUI application that is responsible mainly for
receiving data sent by clients group, managing and updating data to provide network owner up to date
view. Secondly, it is responsible for sending control commands like logging off and shutting down to
required station with ability to determine a period after which the command takes place. Thirdly, it
provides facility of full control of the clients by using RDP protocol. Finally, it uses router information
taken by http requests to show a list of possible illegal users, who have access to the network without
having client program installed on their machines, and gives possibility of depriving them from
accessing network anymore.
3. Software Design
Software can be mainly considered in two parts which are client and server parts. Each of them has its
structure and its own device. The study is going to discuss client side and the server.
80
European Journal of Social Sciences – Volume 54, Issue 1 January (2017)
As shown in the Figure above, the main class is maintaining either direct or indirect
relationship with each of other classes. It initializes an object of HeartBeat class in the first place with
associated server information taken from ServerInfo class. HeartBeat operation is a continuous
operation that must be held all the time as an indicator of client process health, so every 20 seconds this
operation is done continuously. Then it becomes ready to hear commands from the server in any time,
in this case it is necessary to call the Operation class with the desired operation that is triggered by the
81
European Journal of Social Sciences – Volume 54, Issue 1 January (2017)
server. Technical aspects of the main parts of the client side will be proposed in the part of proposed
technique in the following pages.
Note: any client that accesses the network but not sending HeartBeat will appear in the server
as a thief so client program should be run as soon as the client PC is running, so it is located in the
startup programs in windows to be lunched when the windows boots up.
In the client part we use The TCP protocol because of its reliability features. It plays an
important role in both sending and receiving data to and from the server. It provides a reliable
information delivery for the commands sent from the server. However, it insures that the client heart
beat is accessing the server without any problems.
Even it has less number of classes and simpler outer relations server classes are more
complicated internally and are having more details compared with the client one’s.
As class diagram illustrates the main class instantiates an instance of RawInfo class so that it
will be able to get information from the router or access point about the network state and the active
clients. And the rest of control and monitoring operations are encapsulated inside the form class.
82
European Journal of Social Sciences – Volume 54, Issue 1 January (2017)
83
European Journal of Social Sciences – Volume 54, Issue 1 January (2017)
protocols to communicate with router, and other devices and control them remotely. The pseudo code
of the most important parts of the proposed model is given as the following:
Table 1: The pseudo code of the most important parts of the proposed model
1: Begin
2: If router credentials are incorrect
3: Show only clients which running service
4: End
5: Else
6: Show all active hosts and distinguish illegal ones
7: If server receives client beat
8: Add client, client Info and list of running programs on that client
9: Update clients’ data every 20 seconds
10: Remove clients when they shutting down
11: Send command to the client and retrieve result
12: If client is illegal
13: Alert the user
14: If user wants to deny client
15: Access the router’s privileges in router’s control panel and deny wanted
16: If remote connection to a client is establishing
17: Check credentials if valid start session
18: Else
19: End session
20: End
85
European Journal of Social Sciences – Volume 54, Issue 1 January (2017)
Test case 4 and 5 client disappears when shutting down and appears when boot up
87
European Journal of Social Sciences – Volume 54, Issue 1 January (2017)
4. Results
Proposed project result is a complete tool that collects all information about your network and in a
very-well organized scheme. This forms a friendly mechanism to monitor a network and manage its
configurations.
Precisely using this system, you can:
• Get helpful information about your network.
• Keep a track of clients’ activities.
• Control clients operating periods.
• Organize access to the internet by editing permissions and denying illegal access.
• Share a client screen and monitor them.
• Send files to clients.
• Get a remote full control of clients concurrently.
All of this is given in one place and in a high performance and instantaneous results.
88
European Journal of Social Sciences – Volume 54, Issue 1 January (2017)
The following snapshots represent the main screens used to perform the application:
• This is the main interface it contains all control buttons in clients and router and displays
network state and hosts information.(see figure 12).
• Client appear inside the server program using screen sharing and file, so screen can be
transferred to that client using file transfer button on the right. (see figure 13)
89
European Journal of Social Sciences – Volume 54, Issue 1 January (2017)
• MAC filtering to deny access any client by adding its MAC address inside MAC filter
fields and activate filtering mode. (see figure 14)
5. Conclusion
In this study of network management system, the proposed approach is implementing a set of well-
known networking protocols to find everything about them and monitor the full state of the network. It
is an efficient method that provides all needed knowledge about network suitable way that optimizes
the needed owner interactions that is necessary to configure things as desired. The solution is
programmatically modeled by using a set of simple and effective algorithmic techniques that manage
90
European Journal of Social Sciences – Volume 54, Issue 1 January (2017)
client’s communications do requests to the router pages, file transferring and screen sharing with basic
controlling.
Moreover, the way in which application designed improves user control efficiency when using
remote techniques, because of providing control of up to five devices concurrently adjacent tabs that
control devices by visiting from remote sessions and windows remote connection utility, which
provides each remote session in an independent window that causes difficulty in managing them by
two remote sessions.
Acknowledgment
The author would like to thank Palestine Technical University – Kadoorie (PTUK) for supporting this
research and allowing him to conduct this work in the university labs. The system is developed for
educational purpose and is currently in use at Computer Networks Lab at University.
References
[1] Bär, A., Finamore, A., Casas, P., Golab, L., & Mellia, M. (2014, October). Large-scale network
traffic monitoring with DBStream, a system for rolling big data analysis. In Big Data (Big
Data), 2014 IEEE International Conference on (pp. 165-170). IEEE.
[2] Daadoo, M., Tarapiah, S., & Atalla, S. (2016). Evaluating Efficiency of Multi-Layered Switch
Architecture in All-Optical Networks. International Journal of Applied Engineering
Research, 11(22), 11030-11036.
[3] Daadoo, M., & Daraghmi, Y. (2015, August). Searching of optimum characteristics of multi-
layer switching architecture in all-optical networks. In Heterogeneous Networking for Quality,
Reliability, Security and Robustness (QSHINE), 2015 11th International Conference on (pp.
50-55). IEEE.
[4] Fusco, F., & Deri, L. (2010, November). High speed network traffic analysis with commodity
multi-core systems. In Proceedings of the 10th ACM SIGCOMM conference on Internet
measurement (pp. 218-224). ACM.
[5] Remote Desktop Protocol. Wikimedia Foundation, n.d. Web. 18 June 2016.
91
View publication stats