Advanced Secured System

25
Synopsis “ADVANCED SECURED SYSTEM” deals with the Server based Information and Maintenance of the Server. This system is used to reduce the workload of the server. It provides mail services, chat services between the clients and it also response to the client requests. This system is designed as a middleman between the client and the server. This system provides all kinds of services to the clients like file transfer, mail, chat etc... This system is cost-effective and provides a security like firewall to the server. Though there are any software available in the market there is no popular server in terms of cost and providing services. Developed in java platform will be an advantage to this software. This can be used in various platforms. The main objective of this software is to Speed up the data transfer Check for virus file Provide mail, chat services Strong authentication Sharing resources Flexibility 1.2 ABOUT THE PROJECT

Transcript of Advanced Secured System

Page 1: Advanced Secured System

Synopsis

“ADVANCED SECURED SYSTEM” deals with the Server based Information and

Maintenance of the Server. This system is used to reduce the workload of the server. It provides

mail services, chat services between the clients and it also response to the client requests. This

system is designed as a middleman between the client and the server. This system provides all

kinds of services to the clients like file transfer, mail, chat etc... This system is cost-effective and

provides a security like firewall to the server. Though there are any software available in the

market there is no popular server in terms of cost and providing services. Developed in java

platform will be an advantage to this software. This can be used in various platforms.

The main objective of this software is to

Speed up the data transfer

Check for virus file

Provide mail, chat services

Strong authentication

Sharing resources

Flexibility

1.2 ABOUT THE PROJECT

The Project ”ADVANCED SECURED SYSTEM” deals with the Server

maintenance for a company.

The project consists of following modules:

File Transfer

E-mail

Resource Sharing

Chat

Web Page View

Page 2: Advanced Secured System

File Transfer:

File transfer is handled between client and the server. To share a file from

another client the requestor client sends the request to the server. The server then gets the

file from the client which provides the requested file. Then the server sends the file to the

requested client.

Mail:

With the advent of the Internet and its commercial availability,

the Universal e-mail have become a common feature in today’s

High-tech World. The ability to compose, sends, and receives Electronic

mail has been enormously popular. In this project E-Mail can be sent to the

recipient without having to enter into the Web browser.

Resource Sharing:

Server provides all applications, files and messages. If a client wants

applications from the server, the server grant permission to the particular Client according to

their authentication level, i.e., applications are shared between server and clients. The client

access the printer which are attached to the server when a request is provided. The applications

from the server are sent to the requested client by the provider. Resources include devices such

as CD, Floppy and Printer. The client access these devices which are attached to the server when

a request is provided.

Page 3: Advanced Secured System

Web Page View:

The user requests a web page from the server. If the page is available in the

server then the server provide a copy of the page and open the page in the client location.

2. System Analysis

2.1. Existing System

The existing system is present in Spectrum Software Solution. There

are some problems in sharing resources .The existing system must use a third

party tool to share the resources, provide a mail service within the clients, to

provide sharing of messages between a group of users through chat services.

In existing system when more than one users try to access the resources of the

Server, then the server processing speed decreases. When network traffic arises,

then the data transfer will go down very slow and there is a chance of data to be

lost. There is low level security in the existing system .The cost factor will be

high to provide the services like mailing, chatting. It reduces the response time

experienced by the clients.

Problems associated with the Existing System

Cost-effectiveness

Low level security

Network Traffic

Resource Sharing

Page 4: Advanced Secured System

Low Reliability

Performance problems

Scalability

2.2 Proposed System

The proposed system will provide a good security and improves the performance of the

server. It provides network security and gives access to the resources in server. It improves the

response time to clients. It provides robust authentication. Table handling using Oracle would

increase the ease in handling data, quicker and timely retrieval of data is possible with flexibility

and portability. Keeping in view all these points and problems of the existing system, the new

system has been developed using Java Server Page and Oracle.

Advantages of Proposed System

Increases the system Reliability

Centralized access

Minimum cost

High security

System design for better performance

DAP Concept

4. System Specification

4.1. Hardware Requirements

Processor Intel Pentium Family

Clock Speed 667 MHz

RAM 128 MB

Page 5: Advanced Secured System

Hard Disk 4 GB or higher

Monitor Display panel (640 x 480)

Mouse Logitech Serial Mouse

Keyboard Standard 104 enhanced keyboard

Cache Memory 11,011,968 Bytes

Virtual Memory 32 MB

Display Card Super Video Graphics Adapter (SVGA)

4.2. Software Requirements

Operating System : Windows 98/2000/XP/NT

Web Server : Apache Tomcat 4.1.7

Web Browser : Internet Explorer

Front-End Tool : HTML

Client side Script : JavaScript

Server side Script : Java Server Pages

Back-End Tool : Oracle 8.0

5. System Design

Introduction:

Based on the user requirements and the detailed analysis of a new system, the new

system must be designed. This is the phase of system designing. It is a most crucial phase in the

development of a system.

Normally, the design proceeds in two stages:

1. Preliminary or general design

2. Structure or detailed design

Page 6: Advanced Secured System

Preliminary or general design:

In the preliminary or general design, the features of the new system are specified. The

costs of implementing these features and the benefits to be derived are estimated. If the project is

still considered to be feasible, we move to the detailed design stage.

Structure or detailed design:

In the detailed design stage, computer oriented work begins in earnest. At this stage, the

design of the system becomes more structure design is a blue print of a computer system solution

to a given problem having the same components and interrelationship among the same

components as the original problem. Input, output and processing specification are drawn up in

detail. In the design stage, the programming language and the platform in which the new system

will run are also decided.

There are several tools and techniques used for designing. These tools and techniques are:

Flowchart

Data flow diagram

Data dictionary

Structured English

Decision table

Decision tree

In the system design part is considered after the successful compilation of the

problem analysis. The requirements which and specified in software requirements specification

is verified i.e. whether the requirement specified in it satisfies the user needs.

Page 7: Advanced Secured System

5.1. Project Description

Advanced Secured System developed act as a middleman between the client and the server.

It reduces the work of the server and gives access to server resources to multiple clients at same

time. It reduces the response time experienced by the clients. This server will be cost-effective

when compared to other servers in the market. Other servers in real time provide a single service.

The server, which we have designed, is to meet the real time requirements .To share our thoughts

with other clients in a network we can use chat services where we can exchange out views in the

form of typed-in messages. Chatting can be provided as private chat and as well as multi-chat.

This system in addition checks whether virus file have affected the system and acts as a firewall

to save the system from viruses. If it finds a virus it will report to the server what action to be

taken against the virus file. The server can delete the file from the system or it can block the

virus or it can repair the virus and quarantine the infected file. If the users are on-line they can

share the messages through chatting, if the users are on offline they can share their views through

sending mail to the users in the network who himself registered them as the clients of our system.

User Registration:

Authentication is the technique by which a process verifies that its communication

partner is who it is supposed to be and not an intruder. In order to provide

authentication in this project USER NAME AND PASSWORD has been

designed.

LOGIN

NEW USER

LOGIN:

Login button is used to display the Login Dialog Box. It has two text fields and

one buttons. User Name and password are entered in their respective fields. Entered user

name and password are send to the server and checked with its database. If valid user, then

the user is permitted to enter into the system and their names are added to the list boxes of

both the client and the server. If invalid user then the user exits out of the system.

USER:

Page 8: Advanced Secured System

User button is used to display the New User Dialog Box. It contains the fields such

as User Name, password, First Name, Last Name-mail address, Age, Sex, phone Security

Question Answer. The new user can enter into the system by giving the details in their

respective fields. If the user name and password are non-existence they are considered as a

valid user and sent to the server database.

Establish connection between a client and server. Store login ids of all users of in

the server database. Get the user name & password. Check for the correctness of user name

and password. If it is correct enable the user to use the services else move the user to error

page.

To provide a strong authentication for this system, each user will be provided with a

unique username and password. First the users must register in this system before they access

this system. In registration time, the users will have to answer the questions provided by the

system. The questions will be based on the networking side. If the users answers the questions

and the system will verify the answers and depending upon the correct answers the system will

generate a key. There are three types of categories depending upon the key generated by the

system.

First category of services will provide:

1. File Transfer

2. E-mail

3. Resource Sharing

4. Web page view

5. Chat

Second Category of services will provide:

1. File Transfer

2. E-mail

3. Web page View

Third category of services will provide

1. File Transfer

2. E-mail

Page 9: Advanced Secured System

Each time user enters the system it will check for strong authentication whether the

username and password is valid. If the authentication is valid, the services will be provided to the

user else the user will be move to error page. If the username a password will be sometimes

wrong by misspelled so the user can be once again redirected to the main page.

File Transfer:

If a user wants to access a file in the server he must make a request to the server.

There are three steps followed in File transfer

1. File search

2. Virus File check

3. DAP Concept

First step in File search, it receives a request from the user. The request will be a file

name. First the server finds all root drives in the system. It then searches for all folders in

the system. Then it moves to search for all the subfolders in the system and it searches the

requested file name will reside in subfolder. If it exists then it will took the file and move

to next step i.e. virus check else it reports the requested file does not reside in the system.

Second step will receive the file name and check whether the file name matches with

the updated virus file in the database. If it exists then the server will report the requested

file is virus file else then it will move to next phase which is transferring the file.

Third step uses DAP concept, i.e. check the file length. If the requested file is a valid

one then the server starts to transfer the file from server to client location. After

transferring the file, the server check for the file length. It checks the length of the file,

before and after transmission .If it equals then the file transfer will be completed else the

file transfer is corrupted. Then again it will transfer the file, until the file transfer is

completed.

E-Mail:

Mail is one of the services provided by this system. The ability to compose, send

receive; delete electronic mail has been enormously popular. In this project, E-Mail can

Page 10: Advanced Secured System

be sent to the recipient without having to enter into the Web browser.

Electronic mail is one of the ways where we can send our messages to a

group of people. It is a mixture of text, drawings and facsimile. Normally mail

consists of two subsystems: the user agents, which allow people to read

and send email and the message transfer agents, which move the

messages fro the source to destination. The message inside the envelope

contains two parts: the header and the body. The header contains control

information for the user agents. The body is entirely for the human recipient.

To send an email a user must provide the message, the destination address

and possibly some other parameters (e.g., the priority or security level). The

message can be produced with an editor built into the user agent. The

destination address must be in the format that the user agent can deal with.

Many user agents expect DNS addresses of the form mailbox@location.

When a user is started up to read an email, it will look at the user’s

mailbox

for incoming email before displaying anything on the screen. Then it may

announce the messages in the mailbox or display a on-line summary of each

one and wait for a command. In a sophisticated system, the user can specify

which fields to be displayed by providing a user profile, a file describing the

display format. The first field is message no. The second field, Flags k

meaning that the message is not new but was read previously and kept in

the mailbox. The third filed tells how long the message is and the fourth field

tells who send the message. Finally, the subject field gives the brief

summary what the message is about.

Resource Sharing:

Resources may include, information retrieval, computer data processing, transmission

and storage, and any other functions performed, in whole or in part, by the use of a computer,

computer network, computer software, or computer program. In this project Resources related to

hardware and software are used.

Page 11: Advanced Secured System

Server provides all applications, files and messages. If a client wants

applications from the server, the server grants permission to the particular client according to

their authentication level, i.e., applications is shared to clients. The client can access the printer,

which are attached to the server when a request is provided. If the printer is connected in the

server, and one or more clients request for print options then the server will provide a queuing

system. Then the service will be provided to each user according to queue formed in the server.

If the printer is not connected it will sent an error message. The provider sends the applications

from the server to the requested client. Resources include devices such as CD, Floppy and

Printer. The clients access these devices, which are attached to the server when a request is

provided. If one or more users request the same device then the server will maintain a queue and

provide the services to the users according the queuing system maintained in the server.

Authentication is provided to client to access the devices from the server.

The example devices that can be accessed like Floppy Drive, Printer. Directories & files are

displayed on client machine and can be saved on the client machine according to the

Provided authentication.

Web page View:

The user requests a webpage in the server, if the page resides in the server then the copy

of the page will given to the client. In this service the page will be transferred and immediately

opened at the client window. This service will provide that the page will reside in the server and

it will be opened in the client side without any requirements. This service is entirely different

from transferring a file from the server. In that service the file will be transferred to the client

side and it will be saved on the client side and the user may open the file according to his wish.

But in webpage view the file will not be saved on the client side, it will be opened on the client

side and source file may reside in server.

Chat:

Page 12: Advanced Secured System

Chatting means exchanging the information between the users. Usually this kind of

“talking” is the exchange of typed-in messages requiring one site as the repository for the

messages and a group of users who take part on the network. In some cases, a private

Chat can be arranged between two parties who meet initially in a group. Chat can be ongoing or

scheduled for a particular time and duration. Chat is one way of exchanging our views. The chat

can be selected on a certain topic such as politics, religion, entertainment, education, business

etc... The chat can be done with a group of people and there are ways were we could exchange

confidential matters through private chat. In our system when we register ourselves as a user the

system will provide you a username and password. That username will be considered as your id

for chatting.

5.2. Data Flow Diagram

A DFD is a modeling tool that allows us to show a system as a network of processes (mini systems) connected to each other by paths of data.

Data Flow:

Each arrow in a DFD Represents a path (or pipeline of conveyer belt) of data, called the Data Flow.

Process:

A process represents an automated or manual activity that transforms incoming data flows to outgoing data flows.

Data-Store:

A Data-Store holds the data (for reference), which the system cannot remember.External events and system responses ate From/To “Sources” or “Destination” of the system.

Components of DFD:

The basic components of DFD are following

Page 13: Advanced Secured System

Source/Destination

Process

Data Source

DFD are based on the strategy of structured techniques, Namely:

1. Graphics

2. Top Down Approach

3. Separation of logical from the physical

4. Partitioning

DFD is do not show

How things begin & end

Loops

Decisions

System Flow Diagram

Enter Username &Password

Start

Page 14: Advanced Secured System

Login No Yes

Data Flow Diagram

1. User Validation

Username, Password Username,

Is Valid?

File TransferMail Resource

sharingWeb Page View Chat

LOGIN

RegistrationUser validation

DB

Page 15: Advanced Secured System

Password, Login Key No Yes

2. File Transfer

No

Yes

Yes Virus

No

Valid User

File ChatResource Mail Webpage

File Transfer

File Transfer

File Exists

Virus File

Error Page

File Not Found

Virus File

Page 16: Advanced Secured System

If file length Not equals

If file length equals

3. Mail

Mail

DAP

File Transfer Completed

Inbox Compose

DB

Received Messages

Mail

Page 17: Advanced Secured System

4. Resource Sharing

Floppy Drive Client Requests Had Drives Server Responds CD-Drive Printer

5. Web Page View

No

Yes

6. Chat

Client Server

Webpage Request

Page Exists

Webpage View

Webpage Not Found

Page 18: Advanced Secured System

Chat server

Client-1 Client-1