Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

SNIFFING DETECTION BASED ON MACHINE LEARNING

Balamurugan
Vasanth P Grihith S Youkesh G
Associate Professor
Department of Computer Department of Computer Department of Computer
Department of Computer Science
Science and Engineering Science and Engineering Science and Engineering
and Engineering
Sri Sairam Engineering Sri Sairam Engineering Sri Sairam Engineering
Sri Sairam Engineering College
College Chennai , India College Chennai , India College Chennai , India
Chennai , India
sec20cs093@sairamtap.edu.in sec20cs100@sairamtap.edu.i youkeshganesan1103@gmail
lalitha.cse@sairam.edu.in
n .com

Abstract – Cyber attacks are on the rise and each day System - This system offers search options based on a
cyber criminals are developing more and more variety of criteria. We will create a web portal for this
sophisticated methods to compromise the security of system that will allow users to search portal venues.
their targets. Sniffing is one of the most important This website will be used to check the availability of
techniques that enables the attacker to collect venues, saving us from having to physically visit
information on the vulnerabilities of the devices, them. The database will contain all of the data
protocols and applications that can be exploited within pertaining to each hall. The ability of the system to
the targeted network. It relies mainly on passively manage things like payments, customer reservations,
and halls is one of its most crucial features.
analyzing the traffic exchanged within the network, and
due to its nature, such an activity is difficult to discover. 3) Online Movie Booking System – This project
That is why, in this article, we first revisit existing essentially controls how a multiplex cinema centre
techniques and tools that can be used to perform handles ticket sales by giving customers a user-friendly
sniffing as well as the corresponding mitigation Handy interface through which to do so in there
methods. Based on this background, we propose a novel application software developed in the portal. They used
measurement-based detection method that infers HTML, CSS for the front end web part and PHP Server
whether the sniffing software is active on the suspected for the back end and for handling the database purpose
machine by network traffic probing and machine they have used a My SQL server the project is carried
learning techniques. The presented experimental results out using a series of well-designed forms with
prove that the proposed solution is effective. validations to guarantee the accuracy, consistency, and
Keywords: Sniffing , security, network, network most crucially, reliability of the data entered into the
traffic database.

4) Creating and implementing an online booking system


INTRODUCTION for university sporting events the online booking
system of university sports venues, which is based on
the table tennis Hall of Zhengzhou University, is
Sniffing is a typical part of the reconnaissance phase of
designed to address the issue of uneven use of
the network attack. It can be executed by the attacker who is
university sports facilities. It combines the experience
able to access the targeted network infrastructure. Moreover, of the current online booking systems, the key
the attacker can analyze the passing network traffic using, techniques, and the primary ideal of developing these
e.g., an insecure WIFI network, or as a result of successful systems both domestically and abroad. The system's
insider threat actions. The main aim of such activities is to fundamental features, such as user registration and
identify the machines, protocols and applications that are login, online venue booking, online payment, personal
running within the targeted network. After that the attacker Centre, message board, and database creation, are
can determine the potential vulnerabilities that can be used created in accordance with the analysis of general
to compromise the network. In most cases these actions requirements.
precede he actual attack. Therefore, it must be noted that an
early detection of sniffing is of great importance as it allows 5) Hostel facility booking system employing a priority
the defender to prepare for further attack phases. algorithm - Since everything is now done online,
students at University Sultan Zainal Abidin (UniSZA)
LITERATURE SURVEY are in dire need of a hostel facility booking
management system. UniSZA still uses a manual
1) System for reserving conference rooms across approach for booking at this time. The staff will need a
numerous ministries/departments in various buildings - few days to approve their request. Thus, this approach
Meeting and conference rooms are usually needed in will enable UniSZA students to make reservations
organizations to perform various activities. Every online without having to wait days for clearance. In
organization, whether it be a business or a school, has order to give students, the ability to reserve a
one conference room, it has been determined. This one conference room, court, hall, and student hall at the
conference room must be used by many different hostel, this approach is proposed. Due to the
departments for their occasion. Therefore, there is overwhelming number of other applications, personnel
always a chance that the hall will be reserved on the may occasionally ignore the student application form.
same day by two or more departments. The Furthermore.
departments won't learn about the timing conflict until
the day of the event; by then, it will be too late and
there won't be much time left to make a backup plan.
Therefore, it is necessary to reserve the hall in advance
and make the information known to others so they may
verify the condition of the venue before booking.

2) Celebrations - Online Venue Booking Management


PROPOSED SYSTEM

We propose a machine learning based Malicious URL detection


method that infers whether the given URL is malicious or not
and a machine learning based sniffing detection method that
infers whether the sniffing software is active on the suspected
machine and we present the tools that are publicly available and
can be used to defend attacks against such a threat.

1. Collecting organization IP’s using Wireshark


It includes the collecting the IP’s that accessed the organization
using Wireshark and converted it as a dataset

FIGURE 1: Collecting IP’s using Wireshark

Then the collected IP’s are analysed and the anonymous IP’s are
removed to protect the organization’s data.

FIGURE 2: HALL AVAILABLE

The dashboard includes information about the paid invoices,


reserved rooms, awaiting approvals, and open rooms. The
revenue report for the hall reservation was displayed on the
dashboard in literal terms. The dashboard is a page that has been
upgraded with automation features like report generation so that
the admin side can know about paid invoices, booked rooms, and
pending approvals. It also contains information about the users
who are waiting for the booking of hall dept wise and their
requirement for the specific time slot details and acceptance of
the booking detail and at some cases the booking can be
cancelled by the admin by any instance of time being in the
reservation system we have developed in our application.
FIGURE 3: DASHBOARD

2 . Malicious URL Detection


The application information, which includes the part where
users' (students/faculty) details are filled out in order to
book the hall they prefer, and the venue details, which
contain a dropdown of the different halls that are available
on campus, are two of the four phases that make up the hall
booking process. Once a user selects the hall they want,
they are informed as to whether or not that particular hall is
available.

FIGURE4: HALL BOOKING

The third phase is guest details, which calls for information


on the principal guests who will attend the event as well as
who will host the event and who else will attend. The users
who have previously used the venues for events provide
feedback in the fourth phase.

FIGURE 5: HALL ADDING

The admin can add new venues (halls) that will be offered
to users (students/faculty) on the hall admin page in the
admin portal. The hall that is added here will be reflected on
the end user portal's hall booking page, where the user will
make-a-reservation.
1. DATABASE
The Database has been created in XAMPP php my
admin, in SQL Data format. The Database plays a
major role in our project as it is responsible for
registering customers details i.e., assigning usernames
and password, their personal information, hall
booking details in the college halls, hall details, admin
details, slot details,etc.

FIGURE 6: DATABASE FIGURE 8: USER INTERFACE

METHODOLOGY FEATURES OF PROPOSED SYSTEM


Tools and Frameworks that we used
for the implementation of our
project.
1. After implementing this project, the organization will
be more secure
Frontend: 2. Modification and maintenance can be made very easily
HTML, CSS, since the software is very much flexible.
Framework: 3. Very large data can be stored and also can be retrieved
BOOTSTRAP, PHP very easily.
Database: SQL 4. Speed and accuracy are maintained.
5. Data is collected in csv format
ENTITY DIAGRAM
6. The report can be taken in any format.
7. Elimination of manual processing in user department
8. Faster data processing compared to the manual
processing
9. Ease of Access Application Environment
10. User Friendly Application

CONCLUSION

The main objective of the project is to find whether the given


URL is malicious or not and a sniffing detection method that
infers whether the sniffing software is active on the suspected
machine using machine learning. Thus, the cybercrimes like data-
stealing that is faced by the organization will be reduced and will
make the organization good and better without losing data and to
protect the user’s data and privacy by detecting whether the URL
is malicious or not.

FIGURE 7: ADMIN INTERFACE


REFERENCES
1. Abdullah, O., Al-Maktari, M., Jamaludin, R. and 12. Wang, H. and He, W., 2011, April. A reservation-
Hosam, A.S., 2012. The Acceptance of Online based smart parking system. In 2011 IEEE
Booking System (OBS) Based on the Theory of conference on computer communications workshops
Reasoned Action (TRA): A Case of Sana’a (INFOCOM WKSHPS) (pp. 690-695). IEEE.
University.
13. JosephNg, P.S., Al-Sofi, S.M., Phan, K.Y., Lim, J.T.
2. Al-Maktari, O.A.M., Jamaludin, R. and Hosam, and Lai, S.C., 2023. Design of a Web-Based
A.S., 2012. The Acceptance of Online Booking Platform: Event-Venues Booking and Management
System (OBS) Based on the Theory of Reasoned System. In Pervasive Computing and Social
Action (TRA): A Case of Sana’aUniversity. Networking (pp. 451-461). Springer, Singapore.
System, p.40.
14. Lucho, S., Velarde, A. and Ampuero, M., Smart
3. Perera, K.M.P.B.N., 2021. LECTURE HALL meeting room scheduling and management system
SCHEDULING AND TIMETABLE for a university campus using Android tablets with
MANAGEMENT SYSTEM (Doctoral Firebase backend and Headwind MDM.
dissertation).
15. Basir, N.F., Kasim, S., Hassan, R., Mahdin, H.,
4. Singh, H. and Shah, R.R., 2020, September. Ramli, A., Fudzee, M.F.M. and Salamat, M.A.,
BOOKiiIT-Designing a Venue Booking System 2018. Sweet8bakery booking system. Acta
(Technical Demo). In 2020 IEEE Sixth Electronica Malaysia, 2(2), pp.14-19.
International Conference on Multimedia Big
Data (BigMM) (pp. 287-291). IEEE. 16. O’Hara, L., Nicholls, P. and Keiller, K., 2012.
Search success at the University of Manitoba
5. Lucho, S., Velarde, A. and Ampuero, M., Smart Libraries pre-and post-Summon implementation.
meeting room scheduling and management In Planning and implementing resource discovery
system for a university campus using Android tools in academic libraries (pp. 268-287). IGI
tablets with Firebase backend and Headwind Global.
MDM.
17. Bemile, R., Achampong, A. and Danquah, E., 2014.
6. Li, C., Li, J., Cao, H. and Meng, Z., 2017. Design Online hotel reservation system. International
and implementation of online booking system of Journal of Innovative Science, Engineering &
university sports venues. In MATEC Web of Technology, 1(9), pp.583-588.
Conferences (Vol. 100, p. 02024). EDP Sciences.
18. Wang, J., Zheng, J. and Hu, W.X., 2008. Model of
7. Pandian, A.P., Palanisamy, R., Narayanan, M. and On-line Room Reservation System Based on Web
Senjyu, T. eds., 2022. Proceedings of Third Service and XPMS. Comput. Inf. Sci., 1(3), pp.42-
International Conference on Intelligent 47.
Computing, Information and Control Systems:
ICICCS 2021. 19. Atkinson, S. and Lee, K., 2018. Design and
8. Chhetri, M.B., Krishnaswamy, S. and Loke, S.W., implementation of a study room reservation system:
2004, November. Smart virtual counterparts for Lessons from a pilot program using google
learning communities. In International calendar. College & Research Libraries, 79(7),
Conference on Web Information Systems p.916.
Engineering (pp. 125-134). Springer, Berlin,
Heidelberg. 20. Faust, B.D., Hafner, A.W. and Seaton, R.L., 2010.
OpenRoom: Making room reservation easy for
9. Yadav, S., Girhepunje, T., Nakhate, Y., Budhe, P. students and faculty. Code4Lib Journal, (10).
and Baitule, A., 2019. ERP SYETEM
SOFTWARE FOR HIGHER EDUCATION. 21. Hu, P. and Gu, D.X., 2013. Development and
implementation of web-based online hotel
10. Suryadi, E. and Fauzi, R.H., 2017, November. reservation system. In Applied Mechanics and
PEMODELAN DATA PADA MOBILE Materials (Vol. 347, pp. 2947-2951). Trans Tech
PAYMENT INFORMATION SYSTEM OF Publications Ltd.
THE SPORT HALL CENTRE. In Seminar
Nasional Informatika (SNIf) (Vol. 1, No. 1, pp. 22. German, J.D., Yap, D.C.G. and Binoya, G.O., 2021,
258-264). April. Design and Development of an Integrated
Room Reservation System for Higher Education
11. Siguencia, L.O., Marzano, G. and Gródek- Institutions. In 2021 IEEE 8th International
Szostak, Z., 2018. Online Booking: The Case Of Conference on Industrial Engineering and
Booking a Hotel in Ogrodzieniec Using the Applications (ICIEA) (pp. 231-236). IEEE.
Booking. com Platform. In Proceedings of the
8th International Conference “Economics and
Management-Based on New Technologies

You might also like