• Use Of Network Activity Monitoring System To Solve Problems Case Study Of Benue Internal Revenue Service

  • CHAPTER TWO -- [Total Page(s) 5]

    Page 4 of 5

    Previous   1 2 3 4 5    Next
    • The Pathneck technique uses a carefully constructed packet train to locate bottleneck links, making it easier to diagnose available-bandwidth related problems. Pathneck only needs single-end control and is extremely light-weight. Those properties make it attractive for both regular network users and ISP network operators.
      The BRoute system uses a novel concept source and sinks trees to capture end-user routing structures and network-edge bandwidth information. Equipped with path- edge inference algorithms, BRoute can infer the available bandwidth of all N2 paths in an N-node system with only O (N) measurement overhead. That is, BRoute solves the system-level available-bandwidth monitoring problem. The TAMI measurement infrastructure introduces measurement scheduling and topology-aware capabilities to systematically support all the monitoring and diagnostic techniques that are proposed in this work. TAMI not only can support network monitoring and diagnosis, it also can effectively improve the performance of network applications like peer-to-peer systems.
      At the end of this work the author was able to put forth that monitoring end-to-end available bandwidth and bandwidth bottlenecks on individual network paths can be efficiently and effectively estimated using packet-train probing techniques. Large- scale available bandwidth can be estimated efficiently by using the source and sink tree data structures to capture network edge information. Also with the support of a properly designed measurement infrastructure, bandwidth-related measurement techniques can be convenient enough to be used routinely by both ISPs and regular end users.
      2.8    Activity Log
      The Activity Log reveals all changes that are made on networked computers. This is useful to show how active different forms are on a network and for tracking down the account history in case something seems off (Chapple, 2011). An activity log (also known as an Activity Diary or a Job Activity Log) is a written record of how a user spends his or her time (Chapple, 2011).
      By keeping an activity log for a few days, one can build up an accurate picture of what he or she does during the day, and how he or she invests time. This will tell one whether the memory is quite a poor guide, and that keeping the log is an eye- opening experience. 1Activity Logs helps one identify non-core activities that doesn’t help him or her meet important objectives. For example, one might spend far more time than he thinks surfing the Internet, or getting coffee each afternoon. When he sees how much time wasted on such activities, the author can then change the way that he works to eliminate them.
      2.8.1    What Actions are Logged?
      When an action is logged, the user who performed the action is stored along with the date, time, and IP address where necessary. Internal data about the type of action is also stored. For example, if a form is deleted, it will keep track of the form name. Below is a list of the types of actions that can be logged.
      Form: Almost everything on the Form Manager is a Form related activity. Creating, deleting and editing a form are common occurrences. In addition to these, it will let you know when a theme has been changed or a form has become inactive.
      Entry: It would serve little purpose to show a log of every entry created, but it is important to keep track of any edits or deletions made.
      Report: Similar to forms, the Report Manager controls the main activities here. In addition to creating, editing and deleting a report it can also keep track of toggle password protection and privacy.
      Theme Activity: Logging themes is fairly straightforward. In the Theme Designer you can create, edit, duplicate, change the name of, and delete themes. These are the things you can keep track of.
      User Activity: Stores a record every time a user log in or out of his or her account. It takes down the activity of every activity done by a user depending on the time-set of the software. It can store it with .jpg file extension by taking the screenshot of the activities performed on the users system, or as a file which can still be able to run and save some underground files. There are still many other ways of taking records of user’s activity but these depends on the technology used and the organization involve. The activity log of a user looks like this “Wed mar 28 10.16.04 WAT 2012.jpg”, with the captured picture on top of it.
      2.9    File Activity Monitoring
      File Activity Monitoring (FAM) products are designed to plug a hole in existing Data Loss Prevention (DLP) products by monitoring access to the thousands of files enterprises have in their repositories (Chapple, 2011). There’s a wealth of information stored on file servers, document management systems and other repositories up for grabs to the malicious insider with authorized access that is seeking to steal intellectual property. FAM products provide organizations with the ability to monitor the way insiders use sensitive information.
  • CHAPTER TWO -- [Total Page(s) 5]

    Page 4 of 5

    Previous   1 2 3 4 5    Next
    • ABSRACT - [ Total Page(s): 1 ]Abtsract coming soon ... Continue reading---

         

      APPENDIX A - [ Total Page(s): 4 ]Regadmin.php ... Continue reading---

         

      APPENDIX B - [ Total Page(s): 6 ] ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 2 ]The objective of this work is to develop a system that should be able to;➢    Detect active users.➢    Provide accurate evidence on corporate fraud when investigation is being carried out in an organization.➢    Monitor the daily activities of every user in a network in real time.➢    Has a good memory management for efficient carrying out of activities.1.4    Significance of StudyTherefore some of the significance and benefits of this work include:➢    ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 3 ]CHAPTER THREESYSTEM ANALYSIS AND RESEARCH METHODOLOGY3.1    IntroductionSystem analysis is the study of a system, with the view to determine the bottlenecks and desired end product and establish the most efficient method of obtaining this end (American Heritage Dictionary, 2003). It is the analysis of the requirements of a task, and expression of these tasks in a form that enables a computer to perform the task. System analysis also refers to the process through which an existing system is ex ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 7 ] ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVE SUMMARY AND CONCLUSION5.1    SummaryThe topic of this work was reviewed in chapter one with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state. During the course of the research, the present system was analysed in other to detect the bottlenecks using Structured System Analysis and Design Methodology. Object oriented analysis and design methodology was found sufficient and efficient in the design of the proposed system.5.2 ... Continue reading---

         

      REFRENCES - [ Total Page(s): 1 ]ReferencesBalasubramania. N. A. Balasubramania and A. Venkataramani (2009) Energy consumption in mobile phone: A measurement study and implication for network application.Christopher Wiggins () Network Engineer at Micro Technology Consultants, Inc Fitzgerald, GeorgiaKuenning, G.H. et al (2001) Detecting Insider Threats by Monitoring System Call Activity, Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point.Ningning Hu 2006) Network Monitoring ... Continue reading---