The aim of the project is to provide a cost effective, secure and easy working environment over a network. This FOSS is very much helpful for educational institutes, non profit organizations and small industries. The GUI provides options to choose from monitoring, blocking, filtering and authentication which can be imposed on a network. User accessing the network is required to provide user information when authenticated. Logs are generated with respect to the network usage by the user. The proxy server acts as a gateway between the user terminal and the network. Any activity occurring through this network is logged and can be later used to refine the user privileges. The network administrator can keep track of each and every user and determine necessary steps to ensure a hassle free network operation. The user on the other hand experiences no difference in usage. The network security is implemented using IP Tables, pluggable Authentication Module and Lightweight Directory Access Protocol which provides user level and admin level authentication. An efficient bandwidth monitoring with content filtering is achieved by BandwidthD and DansGuardian
Keywords: Security, Monitoring, Authentication, FOSS, Filtering, Firewall, Admin regulations.
[...] There are some repositories for network monitoring and security tools There are few open source products which are not as capable, simple and flexible as this product. With a few extra open source packages we will be able to eventually address 99% of the functionality of proprietary packages and for free. Network monitoring must ensure confidentiality, integrity and availability of data and services. Controlling is achieved by authentication. Transparent caching, in which all outgoing HTTP requests are intercepted by Squid and all responses are cached. [...]
[...] Sameera Susumu Konno† and Tetsuo Kinoshita†, Tohoku University, Sendai, Miyagi, JAPAN, “Autonomous Network Monitoring System based on Agent- mediated Network Information”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.2, February Seung-Ju Jang, Dong-Eui University, Dept. of Computer Engineering, “Design of the Security Module for Safe Data Sending in a Web System”, IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August Zein Radwan, Camille Gaspard, Ayman Kayssi, and Ali Chehab, Department of Electrical and Computer Engineering, [...]
[...] Effective bandwidth control and monitoring is provided by bandwidthD, which throws an estimated graph of all the terminals over a network at regular intervals. The graphs can then be analyzed to check usage and decide on imposing restrictions on the network. This issue can be further simplified by the application of content filtering mechanisms. DansGuardian is an open source application which provides high level of filtering based on the configuration setup. Minimum Hardware Requirements will be Pentium 3 Processor or higher MB RAM, 512MB to 1GB Hard Disk Drive and NIC. [...]
[...] Fig PAM-LDAP Structure Fig Slapd connectivity SLAPD can be configured to provide strong authentication and data security and certificate-based authentication to restrict access at the socket layer, to control access to the information in your database, to choose from a variety of different database backends, to serve multiple databases at the same time, to write your own modules easily, to create multi-threaded slapd process, to maintain shadow copies of directory information, and to configure through a single configuration file. D. [...]
[...] Operations are provided for adding and deleting an entry from the directory, changing an existing entry, and changing the name of an entry. LDAP provides a mechanism for a client to authenticate LDAP also supports data security such as integrity and confidentiality services. Fig LDAP Structure LDAP- a Directory server is used when you require data to be centrally managed, stored and accessible via standards based methods. C. SLAPD Slapd (Secure Light Weight Directory Access Protocol) is an LDAP directory server that runs on many different platforms. [...]
APA Style reference
For your bibliographyOnline reading
with our online readerContent validated
by our reading committee