You are on page 1of 7

By Shinde Sager Zende Harshal Lande Dyanand

Project Guide

Introduction
This project is about security in internet handle all the unauthorized works that are illegal in the computer network. This will list all the clients that are present in the computer network with ip address of each.

International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model defines seven layers of communications
types, and the interfaces among them. Each layer have number of protocols that are used to communicate in internet. We are implementing this protocols.

``Unauthorized access'' is a very high-level term that can refer to a number of different sorts of attacks. The goal of these attacks is to access some resource that your machine should not provide the attacker.

We provide keyword tracker which tack the client or hacker who is trying to hack any password or trying hack any web site. It will list client IP address and destination that he will going to hack. And it will provide all other necessary information.
The clients that are listed by keyword tracker can be stop by the administrator with IP address. We have also provide image tracker which list all the images that are downloaded by clients We provide error log which wil give u list of errors that are occurred in internet. Path of the files or url of the files that are accessed by the clients also listed in files tab of our project. We also listing all the divice that are connected in network.

network security

PROPOSED SYSTEM
About The Proposed System:-

The system is designed to works with network security, we providing security to network. This project is build in .net. We provide simple GUI which contains different tags like client list , Files list that are used by client, amount of dada uploaded and downloaded by clients, lists of images, errors etc. we are implemented all protocols that are in the ISO standard model.

Features
1. System Guard to protect critical system files and registry 2.Web Control to block inappropriate web-sites

3.Protection against unauthorized termination of security functions


4.Centrally managed deployment and administration 5.Centrally managed malware scans on-demand

6.Real-time event reporting and history logs

SOFTWARE REQUIREMENT :
Operating System Software : Windows XP/Vista/Windows 7 : visual studio 2008or2010, Wireshark, WinPcap.

HARDWARE REQUIREMENT : Processor RAM Hard Disk Keyboard Monitor Mouse : Pentium IV & Onwards : 256 MB (64 MB recommended) : 4.2 GB (20 GB recommended) : 104 Keys : SVGA (Color) : Logitech (Recommended)

You might also like