Você está na página 1de 4

*Corporate Cyber Surveillance System*

                 Corporate Cyber Surveillance System is a server (an


application program) which services the requests of its clients by
forwarding requests to other servers. A client connects to the this Server,
requesting some service, such as a file, connection, web page, or other
resource, available from a different server. Corporate Cyber Surveillance
System provides the resource by connecting to the specified server and
requesting the service on behalf of the client. Corporate Cyber Surveillance
System may optionally alter the client's request or the server's response,
and sometimes it may serve the request without contacting the specified
server. In this case, it would 'cache' the first request to the remote
server, so it could save the information for later, and make everything as
fast as possible.

*  Features:*

  1. Corporate Cyber Surveillance System provides privileged access along


  with strong digital security barrier  and effective filtering facilities.
  2. It also provides a high level caching with the help of primary and
  secondary caches.
  3. Efficient Bandwidth Manager based on user privileges.
  4. A user history module to track each one's activities for further
  analysis.
  5. Remote Administrator Access

*Modules:*

*  Digital Security Barrier and Filtering Mechanism: *

     *DSBFM* is dedicated module  in which inspects network traffic passing


through it, and denies or permits passage based on a set of rules. Usually
the Digital Security Barrier concept is implemented in such a way that the
application maintains a list of denied urls and the network inspection based
on that list. DSBFM provides a high level of flexibility. It should be
flexible in terms of the environments in which it will work and it should be
flexible in allowing you to set access privileges that are directly in line
with company's Internet Acceptable Use Policy. For instance, suppose your
company culture and your AUP are such that you would like to permit online
shopping on the Web during lunch hours and after 6 pm. Your employee
internet management solution should include time controls that allow you to
sync your AUP with your actual Internet access restrictions.

   In our project we are also providing a privilege based access control
system. The concept is like this: in an organization there are different
levels of users. When a request comes from a client the module checks for
the privileges available to that client. Later if the requested client has
right privilege, it will be processed.*     *

*Caching Server:*

Caching is a way to store requested Internet objects (e.g. data like web
pages) available via the HTTP, FTP, and Gopher protocols on a system closer
to the requesting site. Proxy Server can service requests without contacting
the specified server, by retrieving content saved from a previous request,
made by the same client or even other clients in the same network. This is
called caching.

Caching server keep local copies of frequently requested resources, allowing


large organizations and Internet Service Providers to significantly reduce
their upstream bandwidth usage and cost, while significantly increasing
performance. This is often useful for Internet Service Providers to increase
speed to their customers, and LANs that share an Internet  connection.

In Corporate Cyber Surveillance System *cache algorithms* (also frequently


called * replacement algorithms* or *replacement policies*) are more
important because they are the optimizing instructions (algorithms) that a
Caching server structure can follow to manage a cache of information stored
on the computer. Cache size is usually limited, and if the cache is full,
the algorithm must choose which items to discard to make room for the new
ones. The *most* efficient caching algorithm would be to always discard the
information that will not be needed for the longest time in the future.

*Bandwidth and Traffic Shaping Mechanism:*

           *BTSM * is the process of measuring and controlling the


communications (traffic, packets) on a network link. To keep your Internet
connection working fast and smoothly, you must control your use of
bandwidth, to stay below the maximum capacity of the network link. In which
the available bandwidth will be given to users based on their privileges.

           The theory behind the Bandwidth Manager* * is that the request


packets are handled by three levels(levels may change according to category)
of priority queues which implemented in threads. Each have its own priority
and packets are enqueued based on privilege. When packets are arrived
another thread find out the priority and inserted into appropriated thread
queue. At the same time another thread read the queue and sends the packets
from the queues according to the priority. A table/graphical report can be
generated using the time interval between packet request and response.

*User History Report Generation Tool:*

     Here we maintain a user history which keeps track of the user's


activities which include the visited site and its details including time,
date and whether accessed blocked sites etc.

*Remote Administration:*

     This module is for remotely accessing Internet Manager Administrator


settings or view log files etc from a remote place. For this a site link is
included with the main web page of college/office where Corporate Cyber
Surveillance System is implemented and the administrators can access to
their option after successful authentication.

*Software requirements*

Platform                          : Linux

Language used                           : Java

Technologies use                        :Swing, Socket, Networking

*Hardware requirements*

In order to implement a new system the choice of a processor with maximum


possible speed is made. There should be sufficient memory to store data and
software tools for efficient processing.

System   : IBM-Compatible PC

Processor   : Pentium IV

Speed   : 2.0 GHz


Memory     : 256 MB RAM

Hard Disk Drive          : 40 GB

Você também pode gostar