• Use Of Network Activity Monitoring System To Solve Problems Case Study Of Benue Internal Revenue Service

  • CHAPTER THREE -- [Total Page(s) 3]

    Page 2 of 3

    Previous   1 2 3    Next
    • 3.3.1    Advantages of the Existing System
      From the observation and analysis of the present system, it is clear that the advantages exhibited by the existing system are limited. Such advantages are:
      ➢    The users of each client system can carry out their operation using any system on that network without having any access to the work or operations of the original owner of the system been used.
      ➢    In as much as the client systems have their own memories, the activities done on this client systems saves to the server system directly, and with this, one cannot trace the activities of the individual client systems on that system even if access is granted. The activities of each client system can only be mirrored from the server.
      3.3.2    Disadvantages of the Existing System
      ➢    It monitors the activities on the network with dates only, and does not give the exact time record which would be ineffective in time of investigation at the extreme level.
      ➢    It is not memory efficient, because it does not only monitor the activities on the network, every operation done on the network is from the server.
      ➢    It limits the speed of processing the works placed on the general ledger due to the server’s low memory attribute
      ➢    The proposed system does not explore the processes hierarchy and these is because it takes it logs with the dates only.
      3.4    Analysis of the Proposed System
      The proposed system is out to improve the detection of inside threats and investigations (fraud) of activities done by the network users. These systems uses screen capture traces to create a log for every activity (files) that is accessed by the user.
      In the proposed system, the accounting software used by the bursary department of BIRS will be installed on the server system, so that while the server will be doing its work as a server system and the human users working with the client system stores their work directly in the server’s memory. while the software will be keeping track of the activities of the client systems in real time (which can be changed at any time) and keeping the logs in the server system.
      3.4.1    Justification of the Proposed System
      Clearly, it’s not a responsible approach to run an organization on the basis of blind faith that every single employee can be trusted not to cause any damage. Implicit trust is a recipe for disaster, and it’s not surprising that many corporate executives deploy some kind of transaction-monitoring system to mitigate some of the consequences that ill-judged or malicious employee actions can visit upon the welfare of their organization. The system is more effective and efficient when compared to the existing one being monitored, and because this system have the ability to protect the results of monitoring and only allow authorized personnel to have access to it, it is now obvious that the proposed system has both advantages and disadvantages, but the advantages outweighs the disadvantages thereby justifying the proposed system.
      3.5    Methodology
      A methodology is a system of methods and principles used in a particular “school” of design.
      A methodology can be regarded as a system converting an input into an output. The system is a human-activity system, and is therefore not deterministic.
      Different people will achieve different results. The unit of execution of a methodology (soft or hard) is called a project. There are basically four types of system methodology:
      ➢    Prototyping System Methodology.
      ➢    Expert System Methodology.
      ➢    OOADM – Object-Oriented Analysis and Design Methodology
      ➢    SSADM – Structured System Analysis and Design Methodology
      The international accepted Structured System analysis and Design Methodology (SSADM) and Object Oriented Analysis and Design methodology (OOADM) unit will be deployed in this research. SSADM will be adopted for data collection while OOADM will be used for design phase.
      The steps taken in SSADM to achieve this model are as follows:
      3.5.1    Problem Definition
      Before the design of the proposed system, the basic problems and weaknesses confronting the present system were identified and defined in other to get the needed requirements of the proposed input/output specifications in line with what the automated proposed system would achieve, which would be enumerated as the weaknesses in the subsequent subheading. Some of the problems identified in the present system are:
      ➢    It monitors the activities on the network with dates only.
      ➢    It is not memory efficient.
      ➢    The speed of processing is slow due to the small memory of the server.
      ➢    The activity logs for each user are arranged according to the size of the captured image.
  • CHAPTER THREE -- [Total Page(s) 3]

    Page 2 of 3

    Previous   1 2 3    Next
    • ABSRACT - [ Total Page(s): 1 ]Abtsract coming soon ... Continue reading---

         

      APPENDIX A - [ Total Page(s): 4 ]Regadmin.php ... Continue reading---

         

      APPENDIX B - [ Total Page(s): 6 ] ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 2 ]The objective of this work is to develop a system that should be able to;➢    Detect active users.➢    Provide accurate evidence on corporate fraud when investigation is being carried out in an organization.➢    Monitor the daily activities of every user in a network in real time.➢    Has a good memory management for efficient carrying out of activities.1.4    Significance of StudyTherefore some of the significance and benefits of this work include:➢    ... Continue reading---

         

      CHAPTER TWO - [ Total Page(s): 5 ]The Pathneck technique uses a carefully constructed packet train to locate bottleneck links, making it easier to diagnose available-bandwidth related problems. Pathneck only needs single-end control and is extremely light-weight. Those properties make it attractive for both regular network users and ISP network operators.The BRoute system uses a novel concept source and sinks trees to capture end-user routing structures and network-edge bandwidth information. Equipped with path- edge ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 7 ] ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVE SUMMARY AND CONCLUSION5.1    SummaryThe topic of this work was reviewed in chapter one with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state. During the course of the research, the present system was analysed in other to detect the bottlenecks using Structured System Analysis and Design Methodology. Object oriented analysis and design methodology was found sufficient and efficient in the design of the proposed system.5.2 ... Continue reading---

         

      REFRENCES - [ Total Page(s): 1 ]ReferencesBalasubramania. N. A. Balasubramania and A. Venkataramani (2009) Energy consumption in mobile phone: A measurement study and implication for network application.Christopher Wiggins () Network Engineer at Micro Technology Consultants, Inc Fitzgerald, GeorgiaKuenning, G.H. et al (2001) Detecting Insider Threats by Monitoring System Call Activity, Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point.Ningning Hu 2006) Network Monitoring ... Continue reading---