Tool Tracker: A Toolkit Ensembling Useful Online Networking Tools for Efficient Management and Operation of a Network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32795
Tool Tracker: A Toolkit Ensembling Useful Online Networking Tools for Efficient Management and Operation of a Network

Authors: Onkar Bhat Kodical, Sridhar Srinivasan, N.K. Srinath

Abstract:

Tool Tracker is a client-server based application. It is essentially a catalogue of various network monitoring and management tools that are available online. There is a database maintained on the server side that contains the information about various tools. Several clients can access this information simultaneously and utilize this information. The various categories of tools considered are packet sniffers, port mappers, port scanners, encryption tools, and vulnerability scanners etc for the development of this application. This application provides a front end through which the user can invoke any tool from a central repository for the purpose of packet sniffing, port scanning, network analysis etc. Apart from the tool, its description and the help files associated with it would also be stored in the central repository. This facility will enable the user to view the documentation pertaining to the tool without having to download and install the tool. The application would update the central repository with the latest versions of the tools. The application would inform the user about the availability of a newer version of the tool currently being used and give the choice of installing the newer version to the user. Thus ToolTracker provides any network administrator that much needed abstraction and ease-ofuse with respect to the tools that he can use to efficiently monitor a network.

Keywords: Network monitoring, single platform, client/server application, version management.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1329002

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1239

References:


[1]AdventNET Inc. , Free Network Monitoring Software for Small Networks (Whitepaper), 2005.
[2] Marcus J. Ranum, Kent Landfield, Mike Stolarchuk, Mark Sienkiewicz, Andrew Lambeth, and Eric Wall (Network Flight Recorder, Inc.) , "Implementing a Generalized Tool for Network Monitoring", LISA -97, San Diego, California, October 1997.
[3] Loris Degioanni, Mario Baldi, Fulvio Risso, and Gianluca Varenni, "Profiling and Optimization of Software-Based Network Analysis Applications", Proceedings of the 15th IEEE Symposium on Computer Architecture and High Performance Computing (SBAC-PAD03), pg 226-234, Sao Paulo, Brazil, November 2003.
[4] A. R. Bharambe, M. Agrawal, and S. Seshan. Mercury: Supporting scalable multi-attribute range queries. In Proceedings of SIGCOMM 2004.
[5] C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, R. Rockell, D. Moll, T. Seely, and C. Diot. Packet-level traf_c measurements from the Sprint IP backbone. IEEE Network, 2003.
[6] G. Iannaccone, C. Diot, D. McAuley, A. Moore, I. Pratt, and L. Rizzo. The CoMo White Paper. Technical Report IRC-TR-04-017, Intel Research, Sept. 2004.
[7] S. Jaiswal, G. Iannaccone, C. Diot, J. Kurose, and D. Towsley. Inferring TCP connection characteristics through passive measurements. In Proceedings of IEEE Infocom, Mar. 2004.
[8] T. Karagiannis, A. Broido, M. Faloutsos, and K. claffy. Transport layer identi_cation of P2P traf_c. In Proceedings of ACM Sigcomm Internet Measurement Conference, Oct. 2004.
[9] K. G. Anagnostakis, S. Ioannidis, S. Miltchev, J. Ioannidis, M. B. Greenwald, and J. M. Smith. Efficient packet monitoring for network management. In Proceedings of the 8th IEEE/IFIP Network Operations and Management Symposium (NOMS), April 2002.
[11] K. G. Anagnostakis, S. Ioannidis, S. Miltchev, and J. M. Smith. Practical network applications on a Leight weight active management environment. In Proceedings of the 3rd IFIP International Working Conference on Active Networks (IWAN), October 2001.
[12] L. Deri and S. Suin. Effective Traffic Measurement using ntop. IEEE Communications Magazine, 38(5):138---145, May 2000.
[13] Gordon Lyon, website at : http://www.sectools.org/sniffers.html
[14] Gordon Lyon, website at : http://sectools.org/crypto.html
[15 ] Gordon Lyon, website at : http://sectools.org/vuln-scanners.html
[16] Gordon Lyon, website at : http://sectools.org/port-scanners.html