Network Monitoring System for the UNIX Lab Bradley Kita Capstone Project Mentor: Dr C. David Shaffer Fall 2004/Spring 2005.

Slides:



Advertisements
Similar presentations
ActiveXperts Network Monitor Monitors servers, workstations and devices for availability Alerts and corrects.
Advertisements

HTTP Cookies. CPSC Application Layer 2 User-server state: cookies Many major Web sites use cookies Four components: 1) cookie header line of HTTP.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Creating WordPress Websites. Creating a site on your computer Local server Local WordPress installation Setting Up Dreamweaver.
Chapter 11 Monitoring and Analyzing the Web Environment.
INTERNET DATABASE. Internet and E-commerce Internet – a worldwide collection of interconnected computer network Internet – a worldwide collection of interconnected.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
E-Commerce The technical side. LAMP Linux Linux Apache Apache MySQL MySQL PHP PHP All Open Source and free packages. Can be installed and run on most.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Machine Management
Smart Mail lets you send and receive s from your mobile phone in a quick and easy way using your favorite mail account.
A crash course in njit’s Afs
Telnet/SSH: Connecting to Hosts Internet Technology1.
Module 15: Monitoring. Overview Formulate requirements and identify resources to monitor in a database environment Types of monitoring that can be carried.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
 2000 Deitel & Associates, Inc. All rights reserved. Chapter 24 – Web Servers (PWS, IIS, Apache, Jigsaw) Outline 24.1Introduction 24.2Microsoft Personal.
WhatsUp Gold v15 – WhatsUp Companion 3.7 WhatsUp Companion Extended
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
Shadow Security Scanner Li,Guorui. Introduction Remote computer vulnerabilities scanner Runs on Windows Operating Systems SSS also scans servers built.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
COT 4600 Operating Systems Fall 2009 Dan C. Marinescu Office: HEC 439 B Office hours: Tu-Th 3:00-4:00 PM.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.
Linux Networking and Security
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
LHCb-Italy Farm Monitor Domenico Galli Bologna, June 13, 2001.
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Case Study Dynamic Website - Three Tier Architecture
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
 Load balancing is the process of distributing a workload evenly throughout a group or cluster of computers to maximize throughput.  This means that.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration System Monitoring.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Unix Machine In Computer Science for Teaching Cliff Zou Spring 2015.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
4343 X2 – Outline The Domain Name System The Web.
Unix Servers Used in This Class  Two Unix servers set up in CS department will be used for some programming projects  Machine name: eustis.eecs.ucf.edu.
Client – Server Architecture A Basic Introduction 1.
LO2 Understand the key components used in networking.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
WARCS (Wide Area Remote Control for SPring-8)‏ A. Yamashita and Y.Furukawa SPring-8, Japan Control System Cyber-Security Workshop (CS)2/HEP Oct
Application Layer Functionality and Protocols
Instructor Materials Chapter 5 Providing Network Services
Network Exploitation Tool
WINDOWS NT VERSUS UNIX NT & UNIX OVERVIEW by Zhuo Hong Liu
3.1 Types of Servers.
TYPES OF SERVER. TYPES OF SERVER What is a server.
Working at a Small-to-Medium Business or ISP – Chapter 7
CompTIA Server+ Certification (Exam SK0-004)
Working at a Small-to-Medium Business or ISP – Chapter 7
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Working at a Small-to-Medium Business or ISP – Chapter 7
An introduction to the Linux environment v
Logging into the linux machines
LO3 – Understand Business IT Systems
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

Network Monitoring System for the UNIX Lab Bradley Kita Capstone Project Mentor: Dr C. David Shaffer Fall 2004/Spring 2005

2 UNIX Lab Independent lab − Provided by Math/CS Department Linux-based 24/7 usage − Students can get keys − Remote usage VNC – Virtual Network Computing SSH – Secure Shell − Web hosting - Apache − Mail server IMAP – Connect using almost any mail client − Database - PostgreSQL

3 Problem Lab − Used remotely or locally − Students depend on Lab for classes − Student run Not always supervised − Hung process − Service dies Troubles − Not known until reported by students − Keeps Lab from being used

4 Why build a monitoring system? Early warning − Alert at time of error − Quicker response time Errors always noticed − Constantly watching − Alert on critical, log moderate Quicker Fix − Lab down less − More problem-free time for students to use Lab

5 Overview of System − Big Brother System Pre-built client/server software Dynamically creates HTML reports Modular, extendable to monitor nearly anything − Server PC running Gentoo Linux Uses Apache to host HTTP traffic

6 Overview of Big Brother − Server portion One machine only Monitors Lab-wide processes − Ex: SSH Creates report web pages Sends when error is discovered − Client portion Runs on all machines, including server Monitors aspects on per-machine basis − Ex: Available disk space Reports data to server for processing

7 Monitored Services Connectivity CPU Load Available Disk Space Web Servers IMAP Server (Mail server) Backup Logs Messages Files Critical Processes Mail Delivery SQL Server SSH Servers VNC Sessions

8 Interesting Modules VNC Module − Based from previous script − File and script controlled − Sessions can change, merely update file SQL Module − Connects to server − Runs Command − Verifies result

9

10

11

12

13

14

15 Future Work Secondary server − Monitor main server New modules − Open network ports − Intrusion detection − Network traffic monitor Expand modules − More thorough log scanner − More thorough process monitor − More thorough IMAP monitor Actually send and check for arrival

16 Resources Software − Big Brother − Gentoo Linux − Apache − Python − BASH Script Hardware − UNIX Lab machines ( Dell PCs