0% found this document useful (0 votes)
30 views

Network Security Monitoring System

The document describes a network security monitoring system (NSMS) created by a group of students. The NSMS aims to monitor network activity, detect security threats, and improve security. It does this through continuous monitoring, detecting suspicious activity, and responding to threats. The system can track user logins and logouts, keystrokes, and block restricted websites. It is meant to prevent issues like abuse of privileges, irrelevant searches, and visiting unnecessary websites. The methodology involves monitoring other devices on the network and the system requirements include a minimum of 2GB RAM, 1GHz processor, and 20GB storage. Programming languages used include HTML, CSS, JavaScript, Python, Docker, and MySQL.

Uploaded by

Musab
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

Network Security Monitoring System

The document describes a network security monitoring system (NSMS) created by a group of students. The NSMS aims to monitor network activity, detect security threats, and improve security. It does this through continuous monitoring, detecting suspicious activity, and responding to threats. The system can track user logins and logouts, keystrokes, and block restricted websites. It is meant to prevent issues like abuse of privileges, irrelevant searches, and visiting unnecessary websites. The methodology involves monitoring other devices on the network and the system requirements include a minimum of 2GB RAM, 1GHz processor, and 20GB storage. Programming languages used include HTML, CSS, JavaScript, Python, Docker, and MySQL.

Uploaded by

Musab
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Network Security Monitoring System

GROUP MEMBERS:

Mohammed Musab (20817)


Sahil Mulla (20821)
Ashraf Shaikh (20829)
Farhaan Siddiqui (20831)

OVERVIEW

A network security monitoring system (NSMS) is a set of tools and processes designed to detect,
analyze, and respond to security threats in a computer network. The main goal of an NSMS is to
improve network security by providing continuous monitoring of network activity and detecting
any suspicious or unauthorized activity.

Businesses rely on networks for all operations. Hence, network monitoring is very crucial for any
business. Today, networks span globally, having multiple links established between
geographically separated data centers, public and private clouds. This creates multifield
challenges in network management. Network admins need to be more proactive and agile in
monitoring network performance.

Overall, an NSMS is an essential component of a comprehensive cyber security strategy,


enabling organizations to proactively monitor.
PROBLEM STATEMENT:

1. ABUSE OF USER ACCOUNT PRIVILEGES:


According to data cited by the Harvard Business Review, for the year of 2016, “60% of all
attacks were carried out by insiders.” Whether it’s because of honest mistakes (accidentally
sending info to the wrong email address or losing a work device), intentional leaks and misuse of
account privileges
2. IRRELEVANT SEARCHES:
Students in college or a person at work may not be allowed to use social medias in their pc, with
the help of our key logger feature they will be monitored with every search.
3. REAL TIME MONITORING:
Real-time monitoring is the employment of applications and tools that track and record
continuous snapshots of your network’s overall performance. Organizations use real-time
monitoring to track network activity, improve network security, and identify potential problems
as soon as they arise. Every business, regardless of size, can benefit from monitoring their
network in real time.
4. VISITING UNNECESARRY WEBSITES
Our system can block certain websites that cannot be accessed by the user, which will keep them
indulge their work.

METHODOLOGY:

Main aim in developing this system is to monitor the network of other devices. The system can
identify when the user login in and when the user logs out known as Session time. The NSMS
can also extract the information of the key pressed actions of the end user, it can also block sites
which the user cannot access.
Our system can be used in many places for eg:
 Banks may use network monitoring to detect and prevent fraudulent activities, such as
phishing or other cyber attacks aimed at stealing sensitive information.
 Computer labs may use network monitoring to ensure that students are not accessing
prohibited content or engaging in inappropriate activities while using lab resources.
 Hospitals may use network monitoring to ensure that patient data remains secure and
confidential, and to prevent unauthorized access to critical systems or equipment.
SOFTWARE/HARDWARE REQUIREMENTS:
 Ram: At Least 2GB
 Processor: 1 GHz or faster processor or SoC (system on a chip)
 HDD: 20 GB or more

Languages used

 HTML
 CSS
 JavaScript
 Python
 Docker
 MySqlServeR

You might also like