You are on page 1of 106

1

ACKNOWLEDGEMENT

In connection with the preparation of this project I


want to convey my sincere gratitude and
appreciation to Mrs.Swarna, Head of Computer
Engineering KGPTC Westhill.I am sincerely
thankful to my project guide and respect teacher
Mrs.Sreetha CK for the completion of this
application.
I convey my thanks to teachers who had given
us finely advice and guidance to make this
application a reality.I am very thanks to my
classmates and friends to their valuable suggestions
and co-operation.
Thanking you
By
Jaseela K
Faseela KP
Anju Anilkumar M
Irfan VP
Shiju P
2
PREFACE
Computer made a great impact on our
society.The presence of computer in our
day to day life simply cannot be denied or
ignored.The ability to do different jobs on
the same machine distinguishes computers
from other machines.Computers have very
considerable influence in various aspects
of our society,such as education,
examinations, banking, health, business,
industrial ,airlines ,architects, commerce,
scientific, government, defence etc.
Computers are now inevitable and useful
machine in our life.Computer is the most
powerful machine used by modern
society.It has made great impact on several
activities.Computer become so versatale
and it’s presence is felt in almost all walks
of life.
3
1. ABSTRACT

The project entitled “NETWORK INTRUSION


DETECTION SYSTEM” is responsible for detecting any
kind of intruder that come in to the network. It achieves its
objective with the predetermined information about a
particular intruder, Just as the rest of the Anti-viruses
got updated and also other NIDSs we are updating manually
by inserting necessary information that it need to detect.
4
CONTENTS
1. INTRODUCTION
5

INTRODUCTION
6

1.1 INTRODUCTION

The development in science and technology


are so rapid that the development and existence of mankind is
dependent on the implementation of scientific knowledge. The
entire world is paying much attention to improve the file style
by synthesizing the result of gaining the classical as well as
modern knowledge. No country can move in phase with the
time. Under such circumstances computerization techniques
takes its role.
The main problem arising in a
network is the question of security, which means protection
from attacks. The project entitled ‘Network Intrusion Detection
System’ tries to trace out the intruder packets using IP Address
or data and decides if it is to be forwarded and assures
security.
The project entitled ’Network Intrusion Detection System’ is
an IDS where it monitors packets on the network wire and
attempts to the discovery of hacker/cracker who is attempting
to break into system This discovery is being performed by
comparing the captured packet with the intruder details stored
in the database .If the packet is found to be an intruder it is
then forwarded to the firewall with the respective message for
blocking.

The software is developed using C#.Net as


the front–end and SQL Server as the Back-end. The system can
be implemented in Windows NT Platform. The project ensures
more security, accuracy, and efficiency to the system.

All intrusion-detection systems tested were susceptible to


packet spoofing which tricks the server into thinking packets
have come from a trusted host or into using its own intrusion-
detection counter measures to cut connectivity to legitimate
7
sites. The systems were also found to be vulnerable to
packet fragmentation attacks, and to denial-of-service attacks
that flood networks devices with too many requests for
connections, which can cause them to shut down. The project
entitled “NETWORK INTRUSION DETECTION SYSTEM”
provides server side security for network intrusion through
packet sniffing and analysis and pattern matching. The filtering
mechanism usually can filter IP packets based on some or all of
the following conditions:
• Source IP address, the system from which the packet
originated
• Destination IP address, the system for which the packet is
destined
• Protocol
• Source TCP/UDP port, the port number of the service on
the host originating connection
• Destination TCP/UDP port
• String match in a packet.
8

SYSTEM ANALYSIS
PHASE
9

2.1 Existing system

The existing Network Intrusion Detection System


is a Windows based system developed internally by the
company. It is the manual encoding of the expert system hence
responding properly only to known attacks. This is an ordinary
system that can be used to detect only a known or
ungeneralised set of users. The main drawback lies in the fact
that the system cannot be generalized. The system acts as a
subsystem of the firewall itself. The system contains the
details of the intruder, which is then forwarded to the firewall.
10

2.2. Proposed system

The proposed system is a Network


Intrusion Detection System that is an enhancement of the
existing system. It is a system level program that works as
the lower layer of the firewall. The system checks the
database for the already registered intruders. If found
intruding, they are forwarded to the firewall for blocking. The
firewall is responsible for the blocking of the packet.
11

DESIGN PHASE
12

3.1 Module design

Modular design means breaking the


program tasks into small parts. The advantage of modularity is
in easy accessing of coding and debugging, also more number
of programs can engage in a Software development and the
work could be finished within a targeted minimum span of time
by splitting the program into small parts.

This project is mainly classified into seven modules

• Action
• Intrusion
• Modal
• Traffic
• Sniffing
• Detection
• Reports
13
Main modules are sub divided into small parts, called sub
modules and the details regarding these modules are as
follows.

ACTION - Security Application


Lock Application
Exit

INTRUSION - Registration (IP)


Reg.Alter
Reg.Removal

MODAL - Registration Name


Reg.Alter
Reg.Removal

TRAFFIC - IP Request
Port Scanning
Ping Machine

SNIFFING - TCP Protocol


UDP Protocol
All Sniffing

DETECTION - Detect New


Data Mining

REPORTS - Intruder Details


Modal Details
Detection Details
14

The project is mainly developed in the background


view of administrator. This Software has been mainly divided
into seven to eight modules, starting with Action to Reports.
The first module Action expresses the ability of
administrator to handle the entire control by providing security
using password, also through locking application.
The second module Intrusion does the job of fixing
IP addresses of systems with the assumption that they are
intruders. It also provides the options for updating/dropping of
registration.
The third module Modal also has the same work of
Intrusion except the fact that it registers the intruder with the
predetermined information about intruder.
The fourth module Traffic displays the packet
details based on the source or destination IP. It displays the
available ports in the system, also the connectivity between
systems in the network are checked and give the responds
through the ping machine form.

The fifth module Sniffing gives the details of


packets on the basis of different network protocols.

In the Detection module new and existing intruders


are detected and displayed. It also monitors the data part
included in the packets.

The last module Report gives the entire details of


intruder.
15
3.2 Input design

To ensure that input is understood by the user.


Input design is one of the most expensive phases of the
operation of computerized system and is often the major
problem of a system. A larger number of problems with a
system can usually be traced back to fault input design and
method. Needless to say, therefore that the input data is the
life block of a system and has to be analyzed and designed with
the most consideration.
The decisions made during the input design are: -
 To provide cost effective method of input.
 To achieve the highest possible level of accuracy.

System analysts decide the following input design


details like, what data item to input, what medium to use, how
the data should be arranged or coded data items and
transaction needing validations to detect errors and at last the
dialogue to guide users in providing input.

Input data of a system may not be necessarily a raw


data captured in the system form scratch. These can also be
the output of another system or sub-system. The design of
input covers all phases of input from the certain of initial data
to actual entering the data to the system for processing. The
design of inputs involves identifying the data needed,
specifying the characteristics of each data item, capturing and
preparing data for computer processing and ensuring
correctness of data.
16
Input forms are: -

 Login Form
Using this form the administrator can login to
the application.

 Change Security Form

By using this form the administrator can


change his password.

 Intruder registration Form


This form used for the
registration of new intruders.

 Intruder alteration Form


Intruder alteration is performed by the
use of this form.

 Adaptive model registration Form


New unwanted commands are
registered in this form.

 Adaptive model modification Form


Using this form we can modify
unwanted commands.

 Locking Form
Using this form the administrator can lock the
application from the unauthorized users.
17

3.3 Database design

Database design is required to manage the large bodies of


information. The management of data involves both the
definition of structure of the storage of information and
provisions of mechanism for the manipulation of information. In
addition the db system must provide for the safety of
information handled, despite the system crashes due to
attempts art unauthorized access. For developing an efficient
db, we will have to fulfill certain condition such as:

Control redundancy.
Ease of use.
Data independence.
Accuracy and integrity.
Avoiding inordinate delays.
Recovery form failure.
Privacy and security.
Performance.
There are 6 major steps in design process. The
first 5 steps are usually done on paper and finally the design is
implemented.

Identify the table and relationships


Identify the data that is needed for each table and
relationship
Resolve the relationship.
Verify the design.
Implement the design
18

Table structure:
Table number: 1
Title : Administrator Login
Table Name : Login
Description : The table stores in the login user ID and the
password for the authorization checking. It is used both during
login and locking.
Constraint : The user ID is the primary key.

Field name Type Length Description

Username Varchar 25 User Identification


Password Varchar 25 User Password

Table Number: 2
Title : Intruder Registration Details
Table name : Intruder
Description : The details of already known intruders
Constraints : The intcode is the primary key, Ipaddress Not
Null.

Field Name Type Length Description


Intcode Numeric 9 Intruder Code
Ipaddress Varchar 25 Ip Address
Intdesc Varchar 25 Intruder Description

Regdate DateTime 8 Registration Date


Start time DateTime 8 Start Time
End time DateTime 8 End Time
19

Table number: 3

Title : Adaptive Model Table


Table name : Model
Description : The Adaptive model is created and stored
Constraints : The Modcode is the primary key

Fieldname Type Length Description

Modcode Numeric 9 Model Code


Regdate DateTime 8 Registration date
Pattern Varchar 200 Model Pattern

Table Number: 4
Title : The Intrusion block details

Table name : Detection


Description : The packets detected of intrusion are stored
here.
Constraints : The Detipaddr is the primary key

Field name Type Length Description


Detipaddr Varchar2 25 Detected IP Address

Detdate DateTime 8 Detection Date


Dettime DateTime 8 Detection Time
Protocol Varchar2 10 Protocol
Dettype Varchar2 25 Detection Type

3.4 DATA FLOW DIAGRAM


20

Data Flow Diagram (DFD) is used to define the flow of the


system and its resources such as information. Data Flow
Diagrams are a way of expressing system requirements in a
graphical manner. DFD represents one of the most ingenious
tools used for structured analysis. A DFD is also known as a
bubble chart. It has the purpose of clarifying system
requirements and identifying major transformations that will
become programs in system design. In the normal convention,
logical DFD can be completed using only 4 notations.

: Represents source or destination of data.

Represents data flow.

Represents a process that


transforms incoming data into
outgoing flow.

Represents data store.


21
The DFD at the simplest level is referred to as the
‘CONTEXT ANALYSIS DIAGRAM’. These are expanded by level,
each explaining its process in detail. Processes are numbered
for easy identification and are normally labeled in block letters.
Each Data flow is labeled for easy understanding.
22
Level 0

USER
NIDS DATABASE
23
Level 1

USER NIDS Login

Change
password

Intcode

Add/delete
intruder Intruder
register

Modcod
Set/delete e
model Model

Detipaddr
View Intruder
reports Detection
24

REQUIREMENTS
25

4.1 Hardware requirements

Processor : Pentium lll or higher

Speed : 433 MHZ or higher

RAM : 128 MB or higher

Hard Disk : 20 GB or higher

Disk Drives : 1.44 Floppy Drives, 52 X Compact Disk

Monitor : 15” color monitor

4.2 Software requirements

Front End : Microsoft Visual C#.NET

Back End : SQL Server

Operating System : MS Windows 2000 or higher

Other Software Used : WIN P CAP, Packet X


26

4.3. SOFTWARE DESCRIPTION

The software NIDS is going to develop


under the background of .NET framework. Even though .NET
frame work support more than 20 languages, C# is the powerful
language that has the ability to compete with JAVA, since it is
the only .NET language that comes under the ECMA (European
Computer Manufacturing Association) standard. VB.net has
backward compatibility with old Visual basic. So, it supports old
vb functions. C# is a fresh, clean language. So strongly support
using C# instead of VB.net just for this clean compiler. An
important factor in .NET framework, called optimization makes
a big difference between JAVA and C# and it takes C# to sit in
front of JAVA. Finally the splendid features of .NET, like object
oriented, platform independence (at certain limits), etc makes
the language C# more closer to the users mind.

4.3.1 . VISUAL C# .NET


Visual C# .NET is currently part of the Visual Studio
.NET. Microsoft Visual C# .NET is the tool set for creating
XML Web services and Microsoft.NET–connected
applications for Microsoft Windows and the Web.
27
This robust development package, which
uses the component-oriented C# development language,
offers a language and environment for creating next-
generation software. Visual C# .NET delivers superior
functionality for streamlining business processes,
including:

• Rapid design, development, and deployment support for


creating and consuming XML Web services.
• Form designers and visual controls for creating rich
Windows-based applications.
• Authoring tools and services for building powerful
Microsoft .NET server-based solutions.
• Migration tools for converting Java-based projects to
the Microsoft .NET development environment.
With Visual C# .NET, developers can build
solutions for the broadest range of clients, including
Windows, the Web, and mobile or embedded devices. Using
this elegant programming language and tool, developers
can leverage their existing C++ and Java skills and
knowledge to be successful in the .NET environment.
Some of the main features that make this language
so special are -
1. Object Oriented Language.
2. Powerful Language for making applications.
3. Security.
4. Multithreading and Multitasking.
5. Internet Programming.
6. Intranet Programming.
7. .Interoperability.
8. Easily Understanding code.
LANGUAGE FEATURES
INTUITIVE C++ BASED LANGUAGE
Use a language modeled on C++ syntax,
immediately familiar to C++ and Java developers, as well
28
as intuitive new language constructs that greatly
simplify development tasks.
RELIABLE INTEROPERABILITY
Employ code to call native Windows APIs, use pre-
built COM components, and leverage existing ActiveX
controls to seamless integrate existing applications and
components.

MODERN, COMPONENT-ORIENTED LANGUAGE


Take advantage of inherent support for properties,
indexers, delegates, single and multidimensional arrays,
advanced inheritance, attributes, versioning, and XML
comments.
COMPLETE WINDOWS-BASED APPLICATION
DEVELOPMENT ENVIRONMENT
With visual inheritance, developers can greatly
simplify the creation of Windows-based applications by
centralizing in parent forms the common logic and user
interface for their entire solution. Using control anchoring
and docking, programmers can build resizable forms
automatically, while the in-place menu editor enables
developers to visually author menus directly from within the
Forms Designer.
POWERFUL DEBUGGING AND TESTING TOOLS
Visual C# .NET includes a powerful remote and
multi-language debugger, enabling developers to test
applications and build reliable multi-tier solutions that span
process boundaries and are written in multiple
programming languages.

NET FRAMEWORK CLASS LIBRARY


Gain mature and powerful, built-in functionality,
including a rich set of collection classes, networking
support, multithreading support, string and regular
29
expression classes, and broad support for XML, XML
schemas, XML namespaces, XSLT, XPath, and SOAP.

ROBUST WEB DEVELOPMENT ENVIRONMENT


Create Web-based solutions in C# using the
shared Web Forms Designer and XML Designer. Developers
can also use IntelliSense features and tag completion or
choose the WYSIWYG editor for drag-and-drop authoring to
build interactive Web applications.
MOBILE WEB APPLICATION DEVELOPMENT
Available as part of Visual Studio .NET
Professional Edition, native device support enables
developers to construct solutions for a wide variety of
mobile devices, including Pocket PCs, Tablet PCs, and
mobile phones. Become immediately successful by using
the same programming model and techniques for building
mobile applications as desktop and Web-based
applications.
SOFTWARE TOOLS USED ADO.NET
ADO introduced a simple object model that made
accessing data in Microsoft Windows programs a
straightforward task. In addition, ADO introduced the
concept of disconnected record sets as a way to transport
data between the tires of distributed applications. The low-
level API behind ADO which is called OLE DB.ADO.NET
was designed with the disconnected data in mind, because
this stateless approach works best for distributed Internet
applications. ADO.NET contains two sets of similar
classes. One set is a generic set of classes that can be
used to access all databases that have OLE DB provider
and a set of classes for Microsoft’s SQL Server.

ADO.NET COMPONENTS

The ADO.NET components have been designed to


factor data access from data manipulation. There are two
30
central components of ADO.NET that accomplish
this the Dataset, and the .NET data provider, which is a set
of components including the Connection, Command, Data
Reader, and Data Adapter objects. The ADO.NET Dataset
is the core component of the disconnected architecture of
ADO.NET. The Dataset is explicitly designed for data
access independent of any data source. As a result it can
be used with multiple and differing of any data sources,
used with XML data, or used to manage data local to the
application.

The other core element of the ADO.NET


architecture is the .NET data provider whose components
are explicitly designed for data manipulation and fast,
forward-only, read -only access to data. The connection
object provides connectivity to a data source. The Common
objects enables access to database commands to return
data, modify data, run stored procedures, and sends or
retrieve parameter information. The Data Reader provides
a high - performance stream of data from the data source.
Finally, the Data Adapter provides the bridge between the
Dataset object and the data source.Implementing OLEDB is
ADO.NET. ADO.Net supports traditional database
applications and it also supports futuristic technology
(XML). ADO.Net also gives synchronization between old
data (traditional database applications) and new data (XML
based data access and storage).
31

A S P. N E T
ASP.NET is a unified Web development platform
that provides the services necessary to build enterprise-
class Web applications. While ASP.NET is largely syntax
compatible with Active Server Pages (ASP), it also
provides a new programming model and infrastructure that
allows creating a powerful new class of applications.
ASP.NET is fully supported by the .NET Framework,
allowing one to

take full advantage of the Common Language Runtime


(CLR), type safety, inheritance, and all of the other
features of that platform.

ASP.NET is a compiled. NET-based environment; one can


author applications in any .NET compatible language,
32
including Visual Basic, C# and VJ#. Developers can
easily access the benefits of these technologies, which
include a managed Common Language Runtime
environment, type safety, inheritance, and so on.
ASP.NET has been designed to work seamlessly with
WYSIWYG HTML editors and other programming tools,
including Microsoft Visual Studio.NET. Not only does this
make Web development easier, but it also provides all the
benefits that these tools have to offer, including a GUI that
developers can use to drop server controls onto a Web
page, as well as fully integrated debugging support.

ASP.NET Web Forms: Web Forms are an ASP.NET


technology used to create programmable web pages. They
can present information, using any mark-up language, to
the user in any browser and use code on the server to
implement application logic.

ASP.NET is the next version of Active Server


Pages (ASP); it is a unified Web development platform that
provides the services necessary for developers to build
enterprise-class Web applications. Developers can choose
from the following two features when creating an ASP.NET
application, Web Forms and Web services, or combine
these in any way they see fit.

 Web Forms allows you to build powerful forms-based


Web pages. When building these pages, you can use
ASP.NET server controls to create common UI elements,
and program them for common tasks. These controls allow
you to rapidly build a Web Form out of reusable built-in or
custom components, simplifying the code of a page.

ASP.NET ARCHITECTURE
33

As the illustration shows, all Web clients


communicate with ASP.NET applications through IIS.IIS
deciphers and optionally authenticates the request. If
Anonymous is turned on, no authentication occurs. IIS also
finds the requested resource (such as an ASP.NET
application), and, if the client is authorized returns the
appropriate resource.

In addition to the built-in ASP.NET security


features, an ASP.NET application can use the low-level
security features of the .NET Framework.

SOAP

A World Wide Web Consortium (W3C) standard,


lightweight protocol for exchange of information in a
decentralized, distributed environment. It is an XML based
protocol that consists of three parts:

 An envelope that defines a framework for describing


what is in a message and how to process it, a set of
encoding rules for expressing instances of application-
defined data types, and a convention for representing
remote procedure calls and responses. One computer
makes a method call, and the other computer performs
some computation or services and then returns a result to
the calling application.
34
The important features of SOAP are:

1) SOAP is Platform Independent.


2) SOAP is easy to integrate into disparate Systems.
3) SOAP Poses Fewer Security Risks.

Web Service Web Service


Consumer Server

In
Serialization te
rn
Serialization
et

Proxy Invocation

Method Call Processing


35

4.3.2 . MICROSOFT SQL SERVER 7.0

Relational database systems are the most


important database systems used in the software industry
today. One of the most outstanding systems is Microsoft
SQL Server. SQL Server is a relational database system
developed and marketed by Microsoft. This system is the
most important part of Microsoft Back Office, an enterprise
suite of client server applications .It runs exclusively under
Windows NT, Windows 95/98, and Windows 2000 Server.
The most important aspects of SQL Server 7 are:

 SQL Server works as a natural extension of Windows NT


because it is so closely integrated with this operating
system. As such the user does not have to learn another
user interface to work with this database system.

 SQL Server is easy to use.


 SQL Server has the same easy set up and maintenance
of Windows NT.
 SQL Server uses services of Windows NT to offer new
or extended database capabilities such as
sending and receiving messages, and managing login
security.
 SQL Server scales from a mobile laptop to symmetric
multiprocessor system.
36
 SQL Server provides data warehousing features that
until now have only been available in Oracle and other
more expensive DBMS.
37

DEVELOPMENT
PHASE
38
5.1 Source code

Class1

using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Data;
using System.Data.SqlClient;

namespace kgptc
{
class Class1
{
SqlConnection con = new SqlConnection(@"Data
Source=.\SQLEXPRESS;AttachDbFilename=D:\jaseela\kgptc\kgptc
\login.mdf;Integrated Security=True;User Instance=True");
public int nonquery(String s)
{
int i=0;
con.Open();
try
{

SqlCommand cmd = new SqlCommand(s, con);


i = cmd.ExecuteNonQuery();
}
catch
{
}
con.Close();
return i;
}
public string scalar(String s)
{
String str = "";
try
{
con.Open();

SqlCommand cmd = new SqlCommand(s, con);


str = cmd.ExecuteScalar().ToString();

}
39
catch
{

}
con.Close();
return str;

public DataTable table(string s)


{
con.Open();
SqlCommand cmd=new SqlCommand(s,con);
SqlDataAdapter da=new SqlDataAdapter(cmd);
DataTable dt=new DataTable();
da.Fill(dt);
return dt;
}

}
}

Class2

using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Data;

namespace kgptc
{
class Class2
{
public static string s1;
public static string s2;

}
}
40

Login Form

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Diagnostics;

namespace kgptc
{
public partial class login : Form
{
public login()
{
InitializeComponent();
}

private void Form1_Load(object sender, EventArgs e)


{

label3.Text = "";
try
{
PacketXLib.PacketXClass pkt = new
PacketXLib.PacketXClass();
pkt.Start();
pkt.Stop();
}
catch
{
MessageBox.Show("Please install Both
'WinPcap' and 'PacketX' softwares or Check your network
connection ", "Error");
System.Environment.Exit(0);
}

private void button2_Click(object sender, EventArgs


e)
41
{

private void linkLabel1_LinkClicked(object sender,


LinkLabelLinkClickedEventArgs e)
{
registration f = new registration();

f.Show();

private void linkLabel2_LinkClicked(object sender,


LinkLabelLinkClickedEventArgs e)
{
textBox1.Clear();
textBox2.Clear();
frgt_password frm = new frgt_password();
this.Hide();
frm.ShowDialog();

private void linkLabel3_LinkClicked(object sender,


LinkLabelLinkClickedEventArgs e)
{
Process.Start(@"D:\jaseela\NETWORK.ppt");
}

private void label5_Click(object sender, EventArgs


e)
{

private void vistaButton1_Click(object sender,


EventArgs e)
{
Class1 db1 = new Class1();
Class2 db2 = new Class2();

string i = "";
string j = "";
i = db1.scalar("select loginname from registry
where loginname='" + textBox1.Text + "'");
j = db1.scalar("select password from registry
where password='" + textBox2.Text + "'");
if (i != "" && j != "")
{
mainmenu f = new mainmenu();
f.Show();
42
this.Hide();

}
else
{
if (i == "" || j == "")
{
label3.Text = "";
label3.Text = " Incorrect username or
password";
label3.Enabled = true;
textBox1.Text = "";
textBox2.Text = "";
textBox1.Focus();

else
if (j == "")
{

textBox2.Text = "";
label3.Text = " Incorrect password";
label3.Enabled = true;
}
}

Class2.s1 = i;
Class2.s2 = j;
}

private void vistaButton2_Click(object sender,


EventArgs e)
{
Application.Exit();
}

}
}
43

Main form

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace kgptc
{
public partial class mainmenu : Form
{
public mainmenu()
{
InitializeComponent();
}

private void lockToolStripMenuItem_Click(object


sender, EventArgs e)
{

Form5 f = new Form5();

f.ShowDialog();
}

private void securityToolStripMenuItem_Click(object


sender, EventArgs e)
{
password_change f = new password_change();
f.MdiParent = this;
f.Show();
}

private void exitCtrlEToolStripMenuItem_Click(object


sender, EventArgs e)
{
Close();

}
44
private void
registrationIPToolStripMenuItem_Click(object sender,
EventArgs e)
{
intrder_reg f = new intrder_reg();
f.MdiParent = this;
f.Show();

private void
alterRemoveToolStripMenuItem_Click(object sender, EventArgs
e)
{
intruder_modi f = new intruder_modi();
f.MdiParent = this;
f.Show();
}

private void newToolStripMenuItem_Click(object


sender, EventArgs e)
{
detect f = new detect();
f.MdiParent = this;
f.Show();
}

private void
registrationToolStripMenuItem_Click(object sender, EventArgs
e)
{
model_reg f = new model_reg();
f.MdiParent = this;
f.Show();
}

private void
alterRemoveToolStripMenuItem1_Click(object sender, EventArgs
e)
{

model_modi f = new model_modi();


f.MdiParent = this;
f.Show();
}

private void dataToolStripMenuItem_Click(object


sender, EventArgs e)
{
datamining f = new datamining();
f.MdiParent = this;
f.Show();
}
45

private void iPRequestToolStripMenuItem_Click(object


sender, EventArgs e)
{
iprequest f = new iprequest();
f.MdiParent = this;
f.Show();

private void
portScanningToolStripMenuItem_Click(object sender, EventArgs
e)
{
portscan f = new portscan();
f.MdiParent = this;
f.Show();
}

private void pingMaToolStripMenuItem_Click(object


sender, EventArgs e)
{
ping_machine f = new ping_machine();
f.MdiParent = this;
f.Show();
}

private void
tCPSniffingToolStripMenuItem_Click(object sender, EventArgs
e)
{
tcpsniffing f = new tcpsniffing();
f.MdiParent = this;
f.Show();

private void
uDPSniffingToolStripMenuItem_Click(object sender, EventArgs
e)
{
udpsniffing f = new udpsniffing();
f.MdiParent = this;
f.Show();
}

private void
allSniffingToolStripMenuItem_Click(object sender, EventArgs
e)
{
allsniffing f = new allsniffing();
f.MdiParent = this;
f.Show();
46

private void
intruderDetailsToolStripMenuItem_Click(object sender,
EventArgs e)
{
Class1 db = new Class1();
DataTable dt = new DataTable();
dt = db.table("select * from intruder");
intruder_det f = new intruder_det();
f.MdiParent = this;
f.print(dt);
f.Show();
}

private void
modelDetailsToolStripMenuItem_Click(object sender, EventArgs
e)
{

Class1 db = new Class1();


DataTable dt = new DataTable();
dt = db.table("select * from model");
model_det f = new model_det();
f.MdiParent = this;
f.print(dt);
f.Show();

private void
registrationDetailsToolStripMenuItem_Click(object sender,
EventArgs e)
{
Class1 db = new Class1();
DataTable dt = new DataTable();
dt = db.table("select * from detect");
detection_det f = new detection_det();
f.MdiParent = this;
f.print(dt);
f.Show();

private void
registrationToolStripMenuItem_Click_1(object sender,
EventArgs e)
{
model_reg f = new model_reg();
f.MdiParent = this;
f.Show();
}
47

private void
alterRemoveToolStripMenuItem1_Click_1(object sender,
EventArgs e)
{

model_modi f = new model_modi();


f.MdiParent = this;
f.Show();
}

}
}

Registration Form

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace kgptc
{
public partial class registration : Form
{
public registration()
{
InitializeComponent();
}

private void vistaButton1_Click(object sender,


EventArgs e)
{
textBox4.Focus();
Class1 db = new Class1();
int l = 0;

string s = "";

if (radioButton1.Checked == true)
s = "male";
48
else
s = "female";
if (textBox2.Text != textBox3.Text)
{
textBox2.Text = "";
textBox3.Text = "";
MessageBox.Show("Password mismatch,re
enter");
textBox2.Focus();
}

else
{
l = db.nonquery("insert into registry
values('" + textBox4.Text + "','" + s + "','" +
richTextBox1.Text + "','" + dateTimePicker1.Value + "','" +
textBox5.Text + "','" + comboBox1.Text + "','" +
textBox1.Text + "','" + textBox6.Text + "','" +
textBox2.Text + "','" + comboBox2.Text + "','" +
textBox7.Text + "')");
if (l > 0)
{
MessageBox.Show("Congragulations!!");
}
else
MessageBox.Show("error");
}
}

private void vistaButton2_Click(object sender,


EventArgs e)
{
this.Close();
}

private void vistaButton1_Click_1(object sender,


EventArgs e)
{
textBox4.Focus();
Class1 db = new Class1();
int l = 0;

string s = "";

if (radioButton1.Checked == true)
s = "male";
else
s = "female";
if (textBox2.Text != textBox3.Text)
{
textBox2.Text = "";
textBox3.Text = "";
49
MessageBox.Sh ow("Password mismatch,re
enter");
textBox2.Focus();
}

else
{
l = db.nonquery("insert into registry
values('" + textBox4.Text + "','" + s + "','" +
richTextBox1.Text + "','" + dateTimePicker1.Value + "','" +
textBox5.Text + "','" + comboBox1.Text + "','" +
textBox1.Text + "','" + textBox6.Text + "','" +
textBox2.Text + "','" + comboBox2.Text + "','" +
textBox7.Text + "')");
if (l > 0)
{
MessageBox.Show("Congragulations!!");
}
else
MessageBox.Show("error");
}
}

private void vistaButton2_Click_1(object sender,


EventArgs e)
{
this.Close();
}
}
}

Forgett password form

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace kgptc
{
public partial class frgt_password : Form
50
{
public frgt_password()
{
InitializeComponent();
}

private void vistaButton1_Click(object sender,


EventArgs e)
{

Class1 db1 = new Class1();


string i = "";

i = db1.scalar("select password from registry


where loginname='" + textBox1.Text + "' and sqstn='" +
comboBox1.Text + "' and sans='" + textBox2.Text + "' ");
label5.Text = i;
if (i == "")
{
MessageBox.Show("Invalid Attempt");
}

private void vistaButton2_Click(object sender,


EventArgs e)
{

this.Close();

login f = new login();


f.Show();

}
}

Lock form

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
51
using System.Text;
using System.Windows.Forms;

namespace kgptc
{
public partial class Form5 : Form
{
public Form5()
{
InitializeComponent();
}

private void vistaButton1_Click(object sender,


EventArgs e)
{
Class1 db1 = new Class1();

if (textBox1.Text == "" || textBox2.Text == "")


{
MessageBox.Show("Please specify the User
name and Password");
}
else
{
if (Class2.s1 == textBox1.Text && Class2.s2
== textBox2.Text)
{
this.ControlBox = false;
vistaButton1.Enabled = false;
textBox1.Text = "";
textBox2.Text = "";
label1.Visible = true;
}
else
{
MessageBox.Show("Unauthorised Access");
textBox1.Text = "";
textBox2.Text = "";
textBox1.Focus();

textBox1.Focus();
}

private void vistaButton2_Click(object sender,


EventArgs e)
52
{
Class1 db1 = new Class1();
string i = "";
string j = "";
textBox1.Focus();
if (textBox1.Text == "" || textBox2.Text == "")
{
MessageBox.Show("Please specify the User
name and Password");

}
else
{
i = db1.scalar("select loginname from
registry where loginname='" + textBox1.Text + "' ");
j = db1.scalar("select password from
registry where password='" + textBox2.Text + "'");
if (i == "" || j == "")
{
MessageBox.Show("Invalid user name or
password");
}
else
{
this.ControlBox = true;
vistaButton1.Enabled = true;
label1.Visible = false;

}
}
textBox1.Text = "";
textBox2.Text = "";
}
}
}

Security form

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
53
namespace kgptc
{
public partial class password_change : Form
{
public password_change()
{
InitializeComponent();
}
private void vistaButton2_Click(object sender,
EventArgs e)
{
if (textBox1.Text == "" || textBox2.Text == ""
|| textBox3.Text == "" || textBox4.Text == "")
{
MessageBox.Show("Please fill all fields");
return;
}

Class1 db1 = new Class1();


string i = "";
int j = 0;
try
{
i = db1.scalar("select password from
registry where loginname='" + textBox1.Text + "' and
password='" + textBox2.Text + "'");

if (i == "")
{
MessageBox.Show("Invalid user Id or
Password");
textBox1.Text = "";
textBox2.Text = "";
textBox3.Text = "";
textBox4.Text = "";
textBox1.Focus();
}
else
{
if (textBox3.Text != textBox4.Text)
{
MessageBox.Show("Password
Mismatch,Re-enter");
textBox3.Text = "";
textBox4.Text = "";
}
else
{
j = db1.nonquery("update registry
set password='" + textBox3.Text + "' where loginname='" +
textBox1.Text + "'");
54
if (j > 0)
MessageBox.Show("Password
Changed !!");
else
MessageBox.Show("Password
changing failed,Retry");

}
}
}
catch (Exception ex)
{
MessageBox.Show(ex.ToString());
}
}

private void vistaButton3_Click(object sender,


EventArgs e)
{
this.Close();
}

private void pictureBox1_Click(object sender,


EventArgs e)
{

}
}

Intruder Registration

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace kgptc
{
public partial class intrder_reg : Form
{
55
public intrder_reg()
{
InitializeComponent();
}

private void Form8_Load(object sender, EventArgs e)


{

Class1 db1 = new Class1();


DataTable dt = new DataTable();
try
{
dt = db1.table("select * from intruder");
dataGridView1.DataSource = dt;
}
catch (Exception ex)
{
MessageBox.Show(ex.ToString());
}

private void vistaButton1_Click(object sender,


EventArgs e)
{
textBox1.Text = "";
textBox2.Text = "";
textBox3.Text = "";
textBox1.Focus();
}

private void vistaButton4_Click(object sender,


EventArgs e)
{
Class1 db = new Class1();
DataTable dt = new DataTable();

string k = "";
int s = 0;
try
{
k = db.scalar("select code from intruder
where code='" + textBox1.Text + "'");
if (k != "")
{
MessageBox.Show("Intruder code Already
Exist");
}

else
{
56
if (textBox1.Text == "" ||
textBox2.Text == "" || textBox3.Text == "")
{
MessageBox.Show("Please fill all
fields");
}
else
{
s = db.nonquery("insert into
intruder values('" + textBox1.Text + "','" + textBox2.Text
+ "','" + textBox3.Text + "','" + dateTimePicker1.Value +
"')");
if (s > 0)
{

MessageBox.Show("saved");
}
else
MessageBox.Show("error");
}
}
dt = db.table("select * from intruder");
dataGridView1.DataSource = dt;
}
catch (Exception ex)
{
MessageBox.Show(ex.ToString());
}

private void vistaButton5_Click(object sender,


EventArgs e)
{
this.Close();
}

private void vistaButton1_Click_1(object sender,


EventArgs e)
{
textBox1.Text = "";
textBox2.Text = "";
textBox3.Text = "";
textBox1.Focus();
}

private void vistaButton4_Click_1(object sender,


EventArgs e)
{
Class1 db = new Class1();
DataTable dt = new DataTable();

string k = "";
57
int s = 0;
try
{
k = db.scalar("select code from intruder
where code='" + textBox1.Text + "'");
if (k != "")
{
MessageBox.Show("Intruder code Already
Exist");
}

else
{
if (textBox1.Text == "" ||
textBox2.Text == "" || textBox3.Text == "")
{
MessageBox.Show("Please fill all
fields");
}
else
{
s = db.nonquery("insert into
intruder values('" + textBox1.Text + "','" + textBox2.Text
+ "','" + textBox3.Text + "','" + dateTimePicker1.Value +
"')");
if (s > 0)
{

MessageBox.Show("saved");
}
else
MessageBox.Show("error");
}
}
dt = db.table("select * from intruder");
dataGridView1.DataSource = dt;
}
catch (Exception ex)
{
MessageBox.Show(ex.ToString());
}
}

private void vistaButton5_Click_1(object sender,


EventArgs e)
{
this.Close();
}
}
}

Intruder modification
58

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace kgptc
{
public partial class intruder_modi : Form
{
public intruder_modi()
{
InitializeComponent();
}

private void Form3_Load(object sender, EventArgs e)


{
Class1 db = new Class1();
DataTable dt = new DataTable();
dt = db.table("select * from intruder");
int i;
for (i = 0; i < dt.Rows.Count; i++)
{
comboBox1.Items.Add(dt.Rows[i]
[0].ToString());

}
}

private void comboBox1_SelectedIndexChanged_1(object


sender, EventArgs e)
{
Class1 db = new Class1();
DataTable dt = new DataTable();
dt = db.table("select * from intruder where
code='"+comboBox1.Text+"'");

try
{
textBox2.Text = dt.Rows[0][1].ToString();
textBox3.Text = dt.Rows[0][2].ToString();
DateTime d = DateTime.Parse(dt.Rows[0]
[3].ToString());
dateTimePicker1.Value = d;

}
catch
59
{
}
}

private void button3_Click_1(object sender,


EventArgs e)
{

private void vistaButton1_Click(object sender,


EventArgs e)
{
Class1 db = new Class1();
int j = 0;

if (comboBox1.Text == "")
{
MessageBox.Show("Please select Intruder
Code");
}
else
{
j = db.nonquery("update intruder set
ipaddress='" + textBox2.Text + "',intdes='" + textBox3.Text
+ "',regdate='" + dateTimePicker1.Value + "' where code='"
+ comboBox1.Text + "'");
textBox2.Text = "";
textBox3.Text = "";

if (j > 0)
MessageBox.Show("Intruder Updated !!");
else
MessageBox.Show("Updation
Failed,Retry");
}
}

private void vistaButton2_Click(object sender,


EventArgs e)
{
Class1 db = new Class1();

int j = 0;

if (comboBox1.Text == "")
{
MessageBox.Show("Please select Intruder
Code");
}
else
{
60
if (MessageBox.Show("Are you
sure", "Deletion", MessageBoxButtons.YesNo) ==
DialogResult.Yes)
{

j = db.nonquery("delete from intruder


where code='" + comboBox1.Text + "'");
textBox2.Text = "";
textBox3.Text = "";
if (j > 0)
{
MessageBox.Show("Intruder deleted");
}
else
MessageBox.Show("Deletion
failed,Retry");

}
else
{
this.Close();
}
}

private void vistaButton3_Click(object sender,


EventArgs e)
{
this.Close();
}

}
}

Model Registration

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
61

namespace kgptc
{
public partial class model_reg : Form
{
public model_reg()
{
InitializeComponent();
}

private void Form9_Load(object sender, EventArgs e)


{
Class1 db1 = new Class1();
DataTable dt = new DataTable();
dt = db1.table("select * from model");
dataGridView1.DataSource = dt;
}
private void vistaButton1_Click(object sender,
EventArgs e)
{
textBox1.Text = "";
textBox2.Text = "";
textBox1.Focus();

private void vistaButton3_Click(object sender,


EventArgs e)
{
this.Close();
}

private void vistaButton2_Click(object sender,


EventArgs e)
{
Class1 db = new Class1();
DataTable dt = new DataTable();

string k = "";
int s = 0;
k = db.scalar("select mcode from model where
mcode='" + textBox1.Text + "'");
if (k != "")
{
MessageBox.Show("Model code Already Exist");
}

else
{
if (textBox1.Text == "" || textBox2.Text ==
"")
{
62
MessageBo x.Show("Please fill all
fields");
}
else
{
s = db.nonquery("insert into model
values('" + textBox1.Text + "','" + dateTimePicker1.Value +
"','" + textBox2.Text + "')");
if (s > 0)
{

MessageBox.Show("saved");
}
else
MessageBox.Show("error");
}
}
dt = db.table("select * from model");
dataGridView1.DataSource = dt;
}
}
}

Model modification

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace kgptc
{
public partial class model_modi : Form
{
public model_modi()
{
InitializeComponent();
}

{
63

private void Form10_Load(object sender, EventArgs e)


{
Class1 db = new Class1();
DataTable dt = new DataTable();
dt = db.table("select * from model");
int i;
for (i = 0; i < dt.Rows.Count; i++)
{
comboBox1.Items.Add(dt.Rows[i]
[0].ToString());

}
}

private void comboBox1_SelectedIndexChanged(object


sender, EventArgs e)
{
Class1 db = new Class1();
DataTable dt = new DataTable();
dt = db.table("select * from model where
mcode='" + comboBox1.Text + "'");
try
{
textBox2.Text = dt.Rows[0][2].ToString();
DateTime d = DateTime.Parse(dt.Rows[0]
[1].ToString());
dateTimePicker1.Value = d;
}
catch
{
}

}
private void vistaButton1_Click(object sender,
EventArgs e)
{
Class1 db = new Class1();
int j = 0;

if (comboBox1.Text == "")
{
MessageBox.Show("Please select Model Code");
}
else
{
j = db.nonquery("update model set pattern='"
+ textBox2.Text + "',rdate='" + dateTimePicker1.Value + "'
where mcode='" + comboBox1.Text + "'");
textBox2.Text = "";
if (j > 0)
64
MessageBo x.Show("Model Updated !!");
else
MessageBox.Show("Updation
Failed,Retry");
}

private void vistaButton2_Click(object sender,


EventArgs e)
{
Class1 db = new Class1();

int j = 0;

if (comboBox1.Text == "")
{
MessageBox.Show("Please select Model Code");
}
else
{
if (MessageBox.Show("Are you sure",
"Deletion", MessageBoxButtons.YesNo) == DialogResult.Yes)
{

j = db.nonquery("delete from model


where mcode='" + comboBox1.Text + "'");
textBox2.Text = "";

if (j > 0)
{
MessageBox.Show("Model deleted");
DataTable dt = new DataTable();
dt = db.table("select * from model
where mcode='" + comboBox1.Text + "'");
try
{
textBox2.Text = dt.Rows[0]
[2].ToString();
DateTime d =
DateTime.Parse(dt.Rows[0][1].ToString());
dateTimePicker1.Value = d;
}
catch
{
}
}
else
MessageBox.Show("Deletion
failed,Retry");

}
65
else
{
this.Close();
}

}
}

private void vistaButton3_Click(object sender,


EventArgs e)
{
this.Close();
}
}
}

Detect

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using PacketXLib;
using System.Diagnostics;

namespace kgptc
{
public partial class detect : Form
{
public detect()
{
InitializeComponent();
Load += Detect_Load;
FormClosed += detect_FormClosed;
}
PacketXClass pkt = new PacketXClass();
string protocol;

string s;
Class1 db = new Class1();
int i;
66
int j;
DataTable dt=new DataTable();
private void OnPacket1(PacketXLib.Packet pPacket)
{
ListViewItem mitem = default(ListViewItem);
int ippresent = 2;
mitem =
listView1.Items.Add(pPacket.SourceIpAddress.ToString());
mitem.SubItems.Add(pPacket.SourcePort.ToString(
));
mitem.SubItems.Add(pPacket.DestIpAddress.ToStri
ng());
mitem.SubItems.Add(pPacket.DestPort.ToString());

if ((pPacket.Protocol ==
PacketXLib.PktXProtocolType.PktXProtocolTypeTCP))
{
protocol = "TCP";
}
else if ((pPacket.Protocol ==
PacketXLib.PktXProtocolType.PktXProtocolTypeUDP))
{
protocol = "UDP";
}
else if ((pPacket.Protocol ==
PacketXLib.PktXProtocolType.PktXProtocolTypeEthernet))
{
protocol = "Ethernet";
}
else
{
protocol = "Unknown Protocol";
}

try
{
DataTable dt = new DataTable();
dt = db.table("select * from intruder where
ipaddress='" + pPacket.SourceIpAddress.ToString() + "'");
if(dt.Rows.Count>0)
{

ListViewItem mlist1;
mlist1 =
listView2.Items.Add(pPacket.SourceIpAddress.ToString());

mlist1.SubItems.Add(pPacket.Date.ToShor
tDateString());
mlist1.SubItems.Add(pPacket.Date.TimeOf
Day.ToString());
mlist1.SubItems.Add(protocol);
mlist1.SubItems.Add("Existing IP");
67
i =db.nonquery( "insert into
detect values('" + pPacket.SourceIpAddress.ToString() +
"','" + pPacket.Date.ToShortDateString() + "','" +
pPacket.Date.TimeOfDay.ToString() + "','" + protocol +
"','Existing')");

}
else
{
ippresent = 0;
}
}
catch
{
}
if ((ippresent == 0))
{
Array marray = null;
marray = pPacket.DataArray;
char datachar = '\0';
string datastring = "";
string patternmatch = "";
datastring = "";
for (i = 0; i <= marray.GetUpperBound(0); i++)
{
datachar =
Convert.ToChar(marray.GetValue(i));
if ((datachar > 65 & datachar < 122))
{
datastring = datastring +
Convert.ToChar(datachar);
}
else
{
datastring = datastring +
datachar.ToString();
}
}

try
{
s = db.scalar("select pattern from model");

while (dt.Rows.Count > 0)


{
patternmatch = dt.Rows[0][0].ToString();
if ((datastring.IndexOf(patternmatch) >
0))
{
ListViewItem mlist2;
mlist2 =
listView2.Items.Add(pPacket.SourceIpAddress);
68
mlist2.SubItems.Add(pPacket.D
ate.ToString());
mlist2.SubItems.Add(pPacket.TimeSec.
ToString());
mlist2.SubItems.Add(protocol);
mlist2.SubItems.Add("Existing dt");
j = db.nonquery("insert into detect
values('" + pPacket.SourceIpAddress.ToString() + "','" +
pPacket.Date + "','" + pPacket.Date.TimeOfDay.ToString() +
"','" + protocol + "','Intruder data' )");

}
}
}
catch
{
}
}
}

private void detect_FormClosed(object sender,


FormClosedEventArgs e)
{

try
{
pkt.Stop();
}
catch
{
}
}

private void Detect_Load(object sender, EventArgs e)


{
pkt.OnPacket += this.OnPacket1;
}

private void vistaButton1_Click(object sender,


EventArgs e)
{
try
{
pkt.Start();
}
catch
69
{
MessageBox.Show("Adapter is Already Started
Or Invalid Data Adapter ", "Information");
}
}

private void vistaButton2_Click(object sender,


EventArgs e)
{
try
{
pkt.Stop();
}
catch
{
MessageBox.Show("Already Stoped");
}
}

private void vistaButton3_Click(object sender,


EventArgs e)
{
this.Close();
}

}
}

Data mining

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using PacketXLib;

namespace kgptc
{
public partial class datamining : Form
{
public datamining()
{
InitializeComponent();

}
70
string[] collector = new string[90001];
int count = 0;
int i;

PacketXClass pkt = new PacketXClass();


public void OnPacket(Packet pPacket)
{
ListViewItem mitem = default(ListViewItem);
mitem =
listView1.Items.Add(pPacket.SourceIpAddress.ToString());
mitem.SubItems.Add(pPacket.DestIpAddress.ToStri
ng());
mitem.SubItems.Add(pPacket.SourcePort.ToString(
));
mitem.SubItems.Add(pPacket.DestPort.ToString());
Array marray = null;
marray = pPacket.DataArray;
char datachar = '\0';
string datastring = "";

i = 0;
while ((i < marray.GetUpperBound(0)))
{
datachar =
Convert.ToChar(marray.GetValue(i));
if ((datachar > 65 & datachar < 122))
{
datastring = datastring + datachar;
}
else
{
datastring = datastring +
Convert.ToInt32(datachar).ToString();
}
i = (i + 1);
}
collector[count] = datastring;
count = count + 1;
}
private void datamining_Load(object sender,
EventArgs e)
{
pkt.OnPacket += this.OnPacket;

private void datamining_FormClosed(object sender,


FormClosedEventArgs e)
{
try
{
pkt.Stop();
71
}
catch
{
}
}

private void listView1_SelectedIndexChanged(object


sender, EventArgs e)
{
try
{
i = listView1.FocusedItem.Index;
richTextBox1.Text = "";
richTextBox1.Text = collector[i].ToString();
}
catch (Exception ex)
{
MessageBox.Show(ex.ToString());
}
}

private void vistaButton1_Click(object sender,


EventArgs e)
{

try
{
pkt.Start();
}
catch
{
MessageBox.Show("Adapter is Already Started
Or Invalid Data Adapter ");
}
}

private void vistaButton2_Click(object sender,


EventArgs e)
{
try
{
pkt.Stop();
}
catch
{
MessageBox.Show("Already Stoped");
}

private void vistaButton3_Click(object sender,


EventArgs e)
{
72
this.Close();
}
}
}

Iprequest
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using PacketXLib;
using System.IO;
using System.Net;

namespace kgptc
{
public partial class iprequest : Form
{
public iprequest()
{
InitializeComponent();
Load += iprequest_Load;
FormClosed += iprequest_FormClosed;
}

string strtip;
string endip;
string strtport;
string endport;
PacketXClass pkt = new PacketXClass();
public void OnPacket(Packet packet)
{
strtip = packet.SourceIpAddress.ToString();
endip = packet.DestIpAddress.ToString();
strtport = packet.SourcePort.ToString();
endport = packet.DestPort.ToString();

if ((radioButton1.Checked))
{

try
{
if ((strtip.Equals(textBox1.Text)))
{
73
ListV iewItem list1 =
default(ListViewItem);
list1 = listView1.Items.Add(strtip);
list1.SubItems.Add(strtport);
list1.SubItems.Add(endip);
list1.SubItems.Add(endport);
}
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}
}
if ((radioButton1.Checked))
{
try
{
if ((endip.Equals(textBox1.Text)))
{
ListViewItem list1 =
default(ListViewItem);
list1 = listView1.Items.Add(strtip);
list1.SubItems.Add(strtport);
list1.SubItems.Add(endip);
list1.SubItems.Add(endport);
}
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}
}
}

private void iprequest_Load(object sender, EventArgs


e)
{
pkt.OnPacket += this.OnPacket;
}

private void iprequest_FormClosed(object sender,


FormClosedEventArgs e)
{
try
{
pkt.Stop();
}
catch
{
}
}
74
private void
radioButton1_CheckedChanged(object sender, EventArgs e)
{
try
{
pkt.Stop();
}
catch
{
}
listView1.Items.Clear();

private void radioButton2_CheckedChanged(object


sender, EventArgs e)
{
try
{
pkt.Stop();
}
catch
{
}
listView1.Items.Clear();

private void vistaButton1_Click(object sender,


EventArgs e)
{
if (textBox1.Text == "")
{
MessageBox.Show("Please enter Machine
Name/IP ");
textBox1.Focus();
return;
}
try
{
IPAddress hostIPAddress =
IPAddress.Parse(textBox1.Text);

try
{
pkt.Start();
}
catch
{
MessageBox.Show("Adapter is Already
Started Or Invalid Data Adapter ");
75
}
}
catch
{
MessageBox.Show("Entered IPAddress is
invalid,Re-enter");
textBox1.Text = "";
textBox1.Focus();
}

private void vistaButton2_Click(object sender,


EventArgs e)
{
try
{
pkt.Stop();
}
catch
{
MessageBox.Show("Already Stopped");
}
}

private void vistaButton3_Click(object sender,


EventArgs e)
{
this.Close();
}
}

}
76
Portscan
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Diagnostics;
using System.Windows.Forms;
using PacketXLib;
using System.Net;
using System.IO;
using System.Threading;

namespace kgptc
{
public partial class portscan : Form
{
public portscan()
{
InitializeComponent();
}
int StartPort;
int EndPort;
int CurrPort;
public bool allport;
PacketXClass pkt = new PacketXClass();
System.Net.Sockets.TcpClient tcpscan = new
System.Net.Sockets.TcpClient();

private void radioButton1_CheckedChanged(object


sender, EventArgs e)
{
allport = true;
textBox2.Enabled = false;
textBox3.Enabled = false;
textBox2.Clear();
textBox3.Clear();
}

private void radioButton2_CheckedChanged(object


sender, EventArgs e)
{
allport = false;
textBox2.Enabled = true;
textBox3.Enabled = true;
}
77
private void button2_Click(object sender,
EventArgs e)
{

private void label2_Click(object sender, EventArgs


e)
{

}
//public void a()
//{
// this.BeginInvoke(new aa(port));
//}
//public void port()
//{
// if (textBox1.Text == "")
// {
// MessageBox.Show("Please specify the IP
Address");
// textBox1.Focus();
// return;
// }
// try
// {
// IPAddress hostIPAddress =
IPAddress.Parse(textBox1.Text);
// textBox4.Clear();

// if ((allport))
// {
// StartPort = 1;
// EndPort = 65530;
// }
// else
// {

// try
// {
// if ((int.Parse(textBox2.Text) < 1
| int.Parse(textBox3.Text) > 65530) | (textBox2.Text == "")
| (textBox3.Text == ""))
// {
// MessageBox.Show("Please enter
the ports between 1 and 65530 ");
// return;
// }
// }
// catch
// {
78
// MessageBox.Show("Please Enter
All Fields");
// textBox1.Focus();
// return;
// }
// StartPort =
Convert.ToInt32(textBox2.Text);
// EndPort =
Convert.ToInt32(textBox3.Text);
// }
// progressBar1.Value = 0;
// progressBar1.Maximum = EndPort -
StartPort + 1;
// CurrPort = StartPort;
// while ((CurrPort <= EndPort))
// {

// try
// {
// tcpscan.Connect(textBox1.Text,
CurrPort);
// textBox4.AppendText("Port " +
CurrPort + " open" + "\n\r");
// }
// catch
// {
// textBox4.AppendText("Port " +
CurrPort + " closed" + "\n\r");
// }
// progressBar1.PerformStep();
// CurrPort = (CurrPort + 1);
// }
// }
// catch
// {
// MessageBox.Show("Entered IPAddress is
invalid,Re-enter");
// textBox1.Text = "";
// textBox1.Focus();
// }

//}
//delegate void aa();
//Thread th;
private void vistaButton1_Click(object sender,
EventArgs e)
{
//th = new Thread(a);
//th.Start();
//this.BeginInvoke(new aa(port));

if (textBox1.Text == "")
{
79
MessageBox.Sh ow("Please specify the IP
Address");
textBox1.Focus();
return;
}
try
{
IPAddress hostIPAddress =
IPAddress.Parse(textBox1.Text);
textBox4.Clear();

if ((allport))
{
StartPort = 1;
EndPort = 65530;
}
else
{

try
{
if ((int.Parse(textBox2.Text) < 1 |
int.Parse(textBox3.Text) > 65530) | (textBox2.Text == "") |
(textBox3.Text == ""))
{
MessageBox.Show("Please enter
the ports between 1 and 65530 ");
return;
}
}
catch
{
MessageBox.Show("Please Enter All
Fields");
textBox1.Focus();
return;
}
StartPort =
Convert.ToInt32(textBox2.Text);
EndPort =
Convert.ToInt32(textBox3.Text);
}
progressBar1.Value = 0;
progressBar1.Maximum = EndPort - StartPort
+ 1;
CurrPort = StartPort;
while ((CurrPort <= EndPort))
{

try
{
tcpscan.Connect(textBox1.Text,
CurrPort);
80
textBox4.AppendText("Port " +
CurrPort + " open" + "\n\r");
}
catch
{
textBox4.AppendText("Port " +
CurrPort + " closed" + "\n\r");
}
progressBar1.PerformStep();
CurrPort = (CurrPort + 1);
}
}
catch
{
MessageBox.Show("Entered IPAddress is
invalid,Re-enter");
textBox1.Text = "";
textBox1.Focus();
}

private void vistaButton2_Click(object sender,


EventArgs e)
{

this.Close();

private void vistaButton3_Click(object sender,


EventArgs e)
{
// th.Abort();
//tcpscan.Close();
EndPort = CurrPort;
// tcpscan.EndConnect(IAsyncResult asyncResult);
//pkt.Reset();

//pkt.IsRunning = false;
}

}
81

Pingmachine
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Net;
using System.Diagnostics;
using System.IO;

namespace kgptc
{
public partial class ping_machine : Form
{
public ping_machine()
{
InitializeComponent();
}

private void button1_Click(object sender, EventArgs


e)
{

private void button2_Click(object sender, EventArgs


e)
{

private void button3_Click(object sender, EventArgs


e)
{

private void vistaButton1_Click(object sender,


EventArgs e)
{
if (textBox1.Text == "")
{
MessageBox.Show("Please Enter the Machine
Name / IP ");
textBox1.Focus();
82
return;
}

try
{
IPAddress hostIPAddress =
IPAddress.Parse(textBox1.Text);
richTextBox1.Text = "";

try
{

Process process1 = new Process();


process1.StartInfo.FileName = "cmd.exe";
process1.StartInfo.Arguments = "/C ping
" + this.textBox1.Text.Trim() + " > c:/ping1.txt ";
process1.StartInfo.WindowStyle =
ProcessWindowStyle.Hidden;
process1.StartInfo.CreateNoWindow =
true;
process1.Start();
process1.WaitForExit(30000);
if (!process1.HasExited)
process1.Kill();
process1.Close();

System.IO.StreamReader reader = new


System.IO.StreamReader("c:/ping1.txt");
this.richTextBox1.Text =
reader.ReadToEnd();
reader.Close();
}
catch
{

}
catch
{
MessageBox.Show("Entered IPAddress is
invalid,Re-enter");
textBox1.Text = "";
textBox1.Focus();
}

private void vistaButton2_Click(object sender,


EventArgs e)
{
if (textBox1.Text == "")
83
{
MessageBox.Show("Please Enter the Machine
Name / IP ");
textBox1.Focus();
return;
}
try
{
IPAddress hostIPAddress =
IPAddress.Parse(textBox1.Text);
richTextBox1.Text = "";

try
{
Process process2 = new Process();
process2.StartInfo.FileName = "cmd.exe";
process2.StartInfo.Arguments = "/C
tracert " + this.textBox1.Text + " > c:/tra.txt ";
process2.StartInfo.WindowStyle =
ProcessWindowStyle.Hidden;
process2.StartInfo.CreateNoWindow =
true;
process2.Start();

process2.WaitForExit(50000);

if (!process2.HasExited)
{
process2.Kill();
}

process2.Close();

System.IO.StreamReader reader2 = new


System.IO.StreamReader("C:/tra.txt");
this.richTextBox1.Text = reader2.ReadToEnd();
reader2.Close();
}
catch
{

}
}
catch
{
MessageBox.Show("Entered IPAddress is invalid,Re-
enter");
textBox1.Text = "";
textBox1.Focus();
}
}

private void vistaButton3_Click(object sender, EventArgs e)


{
this.Close();
}
84
}
}

TCP sniffing
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using PacketXLib;
namespace kgptc
{
public partial class tcpsniffing : Form
{
public tcpsniffing()
{
InitializeComponent();
Load += tcpsniffing_Load;
FormClosed += tcpsniffing_FormClosed;

}
PacketXClass pkt = new PacketXClass();
public void OnPacket(Packet ppacket)
{
if ((ppacket.Protocol ==
PacketXLib.PktXProtocolType.PktXProtocolTypeTCP))
{
ListViewItem litem = default(ListViewItem);
litem =
listView1.Items.Add(ppacket.SourceIpAddress.ToString());
litem.SubItems.Add(ppacket.SourcePort.ToStr
ing());
litem.SubItems.Add(ppacket.DestIpAddress.To
String());
litem.SubItems.Add(ppacket.DestPort.ToStrin
g());

}
}
private void listView1_SelectedIndexChanged(object
sender, EventArgs e)
{

}
85
private void button3_Click(object sender,
EventArgs e)
{

private void button1_Click(object sender, EventArgs


e)
{

private void tcpsniffing_Load(object sender,


EventArgs e)
{
pkt.OnPacket += this.OnPacket;
}

private void tcpsniffing_FormClosed(object sender,


FormClosedEventArgs e)
{
try
{
pkt.Stop();
}
catch
{
}
}

private void button2_Click(object sender, EventArgs


e)
{

private void vistaButton1_Click(object sender,


EventArgs e)
{
try
{
pkt.Start();
}
catch
{
MessageBox.Show("Adapter is Already Started
or Invalid Data Adapter ");
}
}

private void vistaButton2_Click(object sender,


EventArgs e)
86
{
try
{
pkt.Stop();
}
catch
{
MessageBox.Show("Already Stoped");
}
}

private void vistaButton3_Click(object sender,


EventArgs e)
{
try
{
pkt.Stop();
}
catch
{
}
Close();
}

}
}

UDP Sniffing
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using PacketXLib;

namespace kgptc
{
public partial class udpsniffing : Form
{
public udpsniffing()
{
InitializeComponent();
Load += udpsniffing_Load;
FormClosed += udpsniffing_FormClosed;
87
}
PacketXClass pkt = new PacketXClass();
public void OnPacket(Packet ppacket)
{
if ((ppacket.Protocol ==
PacketXLib.PktXProtocolType.PktXProtocolTypeUDP))
{
ListViewItem litem = default(ListViewItem);
litem =
listView1.Items.Add(ppacket.SourceIpAddress.ToString());
litem.SubItems.Add(ppacket.SourcePort.ToStr
ing());
litem.SubItems.Add(ppacket.DestIpAddress.To
String());
litem.SubItems.Add(ppacket.DestPort.ToStrin
g());

}
}
private void label1_Click(object sender, EventArgs
e)
{

private void listView1_SelectedIndexChanged(object


sender, EventArgs e)
{

private void udpsniffing_Load(object sender,


EventArgs e)
{
pkt.OnPacket += this.OnPacket;

private void button1_Click(object sender, EventArgs


e)
{

private void udpsniffing_FormClosed(object sender,


FormClosedEventArgs e)
{
try
{
pkt.Stop();
}
catch
88
{
}

private void button2_Click(object sender, EventArgs


e)
{

private void button3_Click(object sender, EventArgs


e)
{

private void vistaButton1_Click(object sender,


EventArgs e)
{
try
{
pkt.Start();
}
catch
{
MessageBox.Show("Adapter is Already Started
or Invalid Data Adapter ");
}
}

private void vistaButton2_Click(object sender,


EventArgs e)
{
try
{
pkt.Stop();
}
catch
{
MessageBox.Show("Already Stoped");
}
}

private void vistaButton3_Click(object sender,


EventArgs e)
{
try
{
pkt.Stop();
}
catch
89
{
}
Close();
}
}
}

AllSniffing
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using PacketXLib;

namespace kgptc
{
public partial class allsniffing : Form
{
public allsniffing()
{
InitializeComponent();
Load += allsniffing_Load;
FormClosed += allsniffing_FormClosed;
}

PacketXClass pkt = new PacketXClass();


public void OnPacket(Packet ppacket)
{
string proto1 = null;
ListViewItem litem = default(ListViewItem);
proto1 =
ppacket.Protocol.ToString().Substring(16, 3);
litem =
listView1.Items.Add(ppacket.SourceIpAddress.ToString());
litem.SubItems.Add(ppacket.SourcePort.ToString(
));
litem.SubItems.Add(ppacket.DestIpAddress.ToStri
ng());
litem.SubItems.Add(ppacket.DestPort.ToString());
litem.SubItems.Add(proto1);
90
}

private void listView1_SelectedIndexChanged(object


sender, EventArgs e)
{

private void allsniffing_Load(object sender,


EventArgs e)
{
pkt.OnPacket += this.OnPacket;
}

private void button1_Click(object sender, EventArgs


e)
{

private void button2_Click(object sender, EventArgs


e)
{

private void button3_Click(object sender, EventArgs


e)
{

private void allsniffing_FormClosed(object sender,


FormClosedEventArgs e)
{
try
{
pkt.Stop();
}
catch
{
}
}

private void vistaButton1_Click(object sender,


EventArgs e)
{
try
{
pkt.Start();
}
catch
91
{
MessageBox.Show("Adapter is Already Started
or Invalid Data Adapter ");
}
}

private void vistaButton2_Click(object sender,


EventArgs e)
{
try
{
pkt.Stop();
}
catch
{
MessageBox.Show("Already Stoped");
}
}

private void vistaButton3_Click(object sender,


EventArgs e)
{

try
{
pkt.Stop();
}
catch
{
}
Close();
}

private void groupBox2_Enter(object sender,


EventArgs e)
{

}
}
}
92

IntruderDetails
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Diagnostics;

namespace kgptc
{
public partial class intruder_det : Form
{
public intruder_det()
{
InitializeComponent();

}
public void print(DataTable dt)
{
CrystalReport1 cr = new CrystalReport1();
cr.SetDataSource(dt);
crystalReportViewer1.ReportSource = cr;

}
private void intruder_det_Load(object sender,
EventArgs e)
{

private void crystalReportViewer1_Load(object


sender, EventArgs e)
{

}
}
}
93

ModaiDetails
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace kgptc
{
public partial class model_det : Form
{
public model_det()
{
InitializeComponent();
}
public void print(DataTable dt)
{
CrystalReport2 cr = new CrystalReport2();
cr.SetDataSource(dt);
crystalReportViewer1.ReportSource = cr;

}
private void model_det_Load(object sender, EventArgs
e)
{

private void crystalReportViewer1_Load(object


sender, EventArgs e)
{

}
}
}
94

Detectiondetails
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace kgptc
{
public partial class detection_det : Form
{
public detection_det()
{
InitializeComponent();

}
public void print(DataTable dt)
{
CrystalReport3 cr = new CrystalReport3();
cr.SetDataSource(dt);
crystalReportViewer1.ReportSource = cr;

}
private void crystalReportViewer1_Load(object
sender, EventArgs e)
{

private void detection_det_Load(object sender,


EventArgs e)
{

}
}
}
95

5. SYSTEM IMPLEMENTATION

Implementation is the stage in the project where


the theoretical design is turned into a working system and is
giving confidence on the new system for the users that it will
work efficiently and effectively. It involves careful planning,
investigation of the current system and its constraints on
implementation, design of methods to achieve the change over,
an evaluation, of change over methods. Apart from planning
major task of preparing the implementation are education and
training of users. The more complex system being implemented,
the more involved will be the system analysis and the design
effort required just for implementation. An implementation
coordinating committee based on policies of individual
organization has been appointed. The implementation process
begins with preparing a plan for the implementation of the
system.

According to this plan, the activities are


to be carried out, discussions made regarding the equipment
and resources and the additional equipment has to be acquired
to implement the new system. Implementation is the final and
important phase. The most critical stage in achieving a
successful new system and in giving the users confidence that
the new system will work and be effective. The system can be
implemented only after thorough testing is done and if it found
to working according to the specification. This method also
offers the greatest security since the old system can take over
96
if the errors are found or inability to handle certain type
of transactions while using the new system.

At the beginning of the development phase a preliminary


implementation plan is created to schedule and manage the
many different activities that must be integrated into plan.
The implementation plan is updated throughout the
development phase, culminating in a changeover plan for the
operation phase. The major elements of implementation plan
are test plan training plan, equipment installation plan and a
conversion plan.
There are three types of implementation:
• Implementation of a computer system to replace a manual
system.
• Implementation of a new computer system to replace an
existing one.
• Implementation of a modified application to replace an
existing one, using the same computer.
97

SYSTEM TESTING
98

SYSTEM TESTING

Testing is the process of executing a program with the indent of


finding any errors. A good test of course has the high
probability of finding a yet undiscovered error. A successful
testing is the one that uncovers a yet undiscovered error.
A test is vital to the success of the system. System test
makes a logical assumption that if all parts of the system are
correct, then goal will be successfully achieved. The candidate
system is subjected to a variety of tests online like
responsiveness, its value, stress and security. A series of tests
are performed before the system is ready for user acceptance
testing.

TYPES OF TESTING

The different types of testing are: -

• Unit Testing
• Integration Testing
• Validation Testing
• Output Testing
• User Acceptance Testing

UNIT TESTING
Here we test each module individually and integrate the
overall system. We got seven modules including the help
module starting from action, registration or we say the updation
99
of databases or the dangerous contents and its live detection
the to some of the friendly network tools to the reports. This
will work individually for the accomplishment of the network
intrusion and also the detection process. Here we already
tested each unit separately and we got a successful answer for
it. Each unit shows its own individuality, as it is network based
software it will accomplishes its mission on well connected
networked computers.
INTEGRATION TESTING
Data can be lost across an interface, one module
can have an adverse effect on the other sub-functions, when
combined may not produce the desired functions. Integrated
testing is the systematic testing to uncover the errors within the
interface. This testing is done by inputting necessary values
and data in the sequential order form action module to the
report. As data of one unit is needed for the working of the
other, for example we register IP Addresses in IP Registration
module and the live detection module uses this registered value
for the matching of the incoming IPs. The need for integrated
system is to find the overall system performance.
VALIDATION TESTING
At the culmination of the black box testing, software
is completely assembled as a package. Interfacing errors have
been uncovered and correct and final series of test, i.e.,
validation test begins. Validation test van is defined with a
simple definition that validation succeeds when the software
functions in a manner that can be reasonably accepted by the
customer.
OUTPUT TESTING
After performing validation testing, the next step is
output testing of the proposed system. Since the system cannot
be useful if it does not produce the required output. Asking the
user about the format in which the system is required tests the
output displayed or generated by the system under
consideration. Here for the working of the software we need to
100
install winPcap and packetX softwares for its working,
these will create a better environment for the software to dull in
perfectly on as windows OS. And still need a well established
LAN connection for the working, for a single system it looks
useless and crazy. Here the output format is considered in two
ways. One is on screen format and another one is printed
format. The output format on the screen is found to be
corrected as the format was designed in the system phase
according to the user needs. As for the hard copy the output
comes according to the specification requested by the user.
Here the output testing does not result in any correction in the
system. Taking various kinds of data plays a vital role in
system testing. After preparing the test data, system under
study is tested using the test data. While testing, errors are
again uncovered and corrected by using the above steps and
corrections are also noted for future use. The system has been
verified and validated by running test data and live data.
First the system is tested with some sample test data
that are generated with the knowledge of the possible range of
values that are required to hold by the fields. The system runs
successfully for the given test data and for the live data.
USER ACCEPTANCE TESTING
User acceptance testing of the system is the key
factor for the success of any system. As we have created an
easy interface it is easy to use. Only tough portion is the
information to be entered should be perfect and has only one
kind of user that’s the Administrator.
The system under consideration is tested for user
acceptance by constantly keeping in touch with prospective
system at the time of development and making change
whenever required. This is done with regard to the input screen
design and output screen design.
101

FUTURE
ENHANCEMENT
102

F UT U R E E N H A N C E M E N T

The project could be further enhanced by detection


of unknown attacks and data rescuing.
103

CONCLUSION
104

CONCLUSION

The project is a great success in the present


environmental condition that is, in the Local Area Network by
providing maximum protection that we could do. The project will
help in the protection purpose of the systems in the LAN which
are connected and the tests have been done.
105

BIBLIOGRAPHY
106

BIBLIOGRAPHY

1. WWW.MICROSOFT.COM
2. WWW.VISUALSTUDIONET.COM
3. WWW.GOOGLE.COM
4. NETWORK SECURITY AND CRYPTOGRAPHY.