The number of Internet users worldwide has skyrocketed since the birth of the World Wide Web. Users access different
internet websites includes social networking websites, peer to peer or other categories which affects internet bandwidth of the
organization. Internet service provider (ISP) will send warning mails forcing administrator to identify the user who is accessing or
misusing internet service. Monitoring of network data gives overall network flow in organization. Monitoring can be done within the
firewall or redirecting the logs that are received to external server. External log server can be deployed, if organization is large in size as
the traffic flowing through the firewall will be more. So internal storage for storing of such huge data can’t be done. This paper proposed
a new deployment technique which helps the administrator to automate by using predefined policies of the organization user behavior
and bandwidth are monitored. To conserve this system automated operation, every step is recorded in log server and evaluated. Tests are
developed and analyzed on proposed system resulting in good result.
Published In:IJCSN Journal Volume 6, Issue 4
Date of Publication : August 2017
Pages : 478-482
Figures :03
Tables : 04
V. Valli Kumari : Dept. of Computer Science and Systems Engineering. AU College of Engineering (A)
Visakhapatnam – 530003, Andhra Pradesh, India.
K.V. Kalyan Chakravarthy : Dept. of Computer Science and Systems Engineering. AU College of Engineering (A)
Visakhapatnam – 530003, Andhra Pradesh, India.
Logs, RMON, SNMP, MIB, Access list
Based on the tests which we performed, proposed system
had shown good results. Without any intervention of the
administrator, the system could be implemented in small
and big organizations. In small organization admin can
restrict the bandwidth so that other users who require
access to internet can be used. In big organizations, system
can automatically monitor and block user immediately so
that organization reputation with not be defamed because
the system has been automated. In future the system can
be extended to servers so that we can restrict unauthorized
access and reduce attacks to the server.
[1] Pries, R., et al. Traffic Measurement and Analysis of a
Broadband Wireless Internet Access. in Vehicular
Technology Conference, 2009. VTC Spring 2009. IEEE
69th. 2009.
[2] Xinyu, X. and S. Mishra. Where is the tight link in a
home wireless broadband environment? in Modeling,
Analysis & Simulation of Computer and
Telecommunication Systems, 2009. MASCOTS '09.
IEEE International Symposium on. 2009.
[3] Alisha Cecil. A Summary of Network Traffic
Monitoring and Analysis Techniques. Available from:
http://www.cse.wustl.edu/~jain/cse567-
06/ftp/net_monitoring.pdf.
[4] Prof. V Valli Kumari, K V Kalyan Chakravarthy.
Analysis of user’s behavior in the network using log
data. IRACST- International Journal of Computer
Networks and AWireless Communications (IJCNWC),
Vol. 7 No.2 Mar 2017. Under printing
[5] Jianxin, L. and B.J. Leon. A formal approach to model
SNMP network management systems. in Computer
Communications and Networks, 1995. Proceedings.,
Fourth International Conference on. 1995.
[6] Prakash Chandrasekaran, Access Control Lists, ISEA,
IMSc, 22 May 2006.
[7] http://www.24onlinebilling.com/telecom-internetbilling-
software-solution.html
[8] www.cisco.com.