-
Use Of Network Activity Monitoring System To Solve Problems Case Study Of Benue Internal Revenue Service
CHAPTER THREE -- [Total Page(s) 3]
Page 2 of 3
-
-
-
3.3.1 Advantages of the Existing System
From the observation and
analysis of the present system, it is clear that the advantages
exhibited by the existing system are limited. Such advantages are:
➢
The users of each client system can carry out their operation using any
system on that network without having any access to the work or
operations of the original owner of the system been used.
➢ In as
much as the client systems have their own memories, the activities done
on this client systems saves to the server system directly, and with
this, one cannot trace the activities of the individual client systems
on that system even if access is granted. The activities of each client
system can only be mirrored from the server.
3.3.2 Disadvantages of the Existing System
➢
It monitors the activities on the network with dates only, and does not
give the exact time record which would be ineffective in time of
investigation at the extreme level.
➢ It is not memory efficient,
because it does not only monitor the activities on the network, every
operation done on the network is from the server.
➢ It limits the speed of processing the works placed on the general ledger due to the server’s low memory attribute
➢ The proposed system does not explore the processes hierarchy and these is because it takes it logs with the dates only.
3.4 Analysis of the Proposed System
The
proposed system is out to improve the detection of inside threats and
investigations (fraud) of activities done by the network users. These
systems uses screen capture traces to create a log for every activity
(files) that is accessed by the user.
In the proposed system, the
accounting software used by the bursary department of BIRS will be
installed on the server system, so that while the server will be doing
its work as a server system and the human users working with the client
system stores their work directly in the server’s memory. while the
software will be keeping track of the activities of the client systems
in real time (which can be changed at any time) and keeping the logs in
the server system.
3.4.1 Justification of the Proposed System
Clearly,
it’s not a responsible approach to run an organization on the basis of
blind faith that every single employee can be trusted not to cause any
damage. Implicit trust is a recipe for disaster, and it’s not surprising
that many corporate executives deploy some kind of
transaction-monitoring system to mitigate some of the consequences that
ill-judged or malicious employee actions can visit upon the welfare of
their organization. The system is more effective and efficient when
compared to the existing one being monitored, and because this system
have the ability to protect the results of monitoring and only allow
authorized personnel to have access to it, it is now obvious that the
proposed system has both advantages and disadvantages, but the
advantages outweighs the disadvantages thereby justifying the proposed
system.
3.5 Methodology
A methodology is a system of methods and principles used in a particular “school†of design.
A
methodology can be regarded as a system converting an input into an
output. The system is a human-activity system, and is therefore not
deterministic.
Different people will achieve different results. The
unit of execution of a methodology (soft or hard) is called a project.
There are basically four types of system methodology:
➢ Prototyping System Methodology.
➢ Expert System Methodology.
➢ OOADM – Object-Oriented Analysis and Design Methodology
➢ SSADM – Structured System Analysis and Design Methodology
The
international accepted Structured System analysis and Design
Methodology (SSADM) and Object Oriented Analysis and Design methodology
(OOADM) unit will be deployed in this research. SSADM will be adopted
for data collection while OOADM will be used for design phase.
The steps taken in SSADM to achieve this model are as follows:
3.5.1 Problem Definition
Before
the design of the proposed system, the basic problems and weaknesses
confronting the present system were identified and defined in other to
get the needed requirements of the proposed input/output specifications
in line with what the automated proposed system would achieve, which
would be enumerated as the weaknesses in the subsequent subheading. Some
of the problems identified in the present system are:
➢ It monitors the activities on the network with dates only.
➢ It is not memory efficient.
➢ The speed of processing is slow due to the small memory of the server.
➢ The activity logs for each user are arranged according to the size of the captured image.
CHAPTER THREE -- [Total Page(s) 3]
Page 2 of 3
-
-
ABSRACT - [ Total Page(s): 1 ]Abtsract coming soon ... Continue reading---
APPENDIX A - [ Total Page(s): 4 ]Regadmin.php ... Continue reading---
APPENDIX B - [ Total Page(s): 6 ] ... Continue reading---
CHAPTER ONE - [ Total Page(s): 2 ]The objective of this work is to develop a system that should be able to;➢ Detect active users.➢ Provide accurate evidence on corporate fraud when investigation is being carried out in an organization.➢ Monitor the daily activities of every user in a network in real time.➢ Has a good memory management for efficient carrying out of activities.1.4 Significance of StudyTherefore some of the significance and benefits of this work include:➢ ... Continue reading---
CHAPTER TWO - [ Total Page(s): 5 ]The Pathneck technique uses a
carefully constructed packet train to locate bottleneck links, making
it easier to diagnose available-bandwidth related problems. Pathneck only needs single-end control and is extremely light-weight. Those
properties make it attractive for both regular network users and ISP
network operators.The BRoute system uses a novel concept source and
sinks trees to capture end-user routing structures and network-edge
bandwidth information. Equipped with path- edge ... Continue reading---
CHAPTER FOUR - [ Total Page(s): 7 ] ... Continue reading---
CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVE SUMMARY AND CONCLUSION5.1 SummaryThe topic of this work was reviewed in chapter one with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state. During the course of the research, the present system was analysed in other to detect the bottlenecks using Structured System Analysis and Design Methodology. Object oriented analysis and design methodology was found sufficient and efficient in the design of the proposed system.5.2 ... Continue reading---
REFRENCES - [ Total Page(s): 1 ]ReferencesBalasubramania. N. A. Balasubramania and A. Venkataramani (2009) Energy consumption in mobile phone: A measurement study and implication for network application.Christopher Wiggins () Network Engineer at Micro Technology Consultants, Inc Fitzgerald, GeorgiaKuenning, G.H. et al (2001) Detecting Insider Threats by Monitoring System Call Activity, Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point.Ningning Hu 2006) Network Monitoring ... Continue reading---