0% found this document useful (0 votes)
89 views7 pages

Revised Copy of Synopsis

The document proposes a remote server access system that allows: 1) Real-time monitoring of user actions, running applications, and file browsing on remote computers. 2) Screenshots and control of remote computers through an intuitive interface. 3) Secure login and password protection.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views7 pages

Revised Copy of Synopsis

The document proposes a remote server access system that allows: 1) Real-time monitoring of user actions, running applications, and file browsing on remote computers. 2) Screenshots and control of remote computers through an intuitive interface. 3) Secure login and password protection.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

INTRODUCTION:

If the eye is the window of the soul (to borrow Leonardo da Vinci’s famous
declaration), then Remote Server Access (user surveillance system) is the window of
what happened in a remote computer. That is Remote Server Access which is a
surveillance system can view system activity and user actions (in real time),
shutdown/restart, and lockdown/freeze and even browse the file system of the remote
computer.
By using Remote Server Access we can view all keystrokes made by the remote
user in real time, as they are typed! We can grab screen shots of the remote computer
desktop, allowing what others are doing on our computer in real time! We can view all
the running applications of the computer and we can control and manage the task by
closing them with a single click. Not only has this it had many other features, which will
be detailed in the project.
Our Remote Server Access is very secure software for it is having Secure
Password Protected login access and it is very easy to use as it has Intuitive interface.
Now to give the idea of our setup, we will have a main system and it will be
connected to all the systems on which surveillance has to be done. Our Remote server
Access package will be installed in the main system and after the installation is complete
the system administrator can administer all the activities and take the right action if some
unwanted thing is being done on the remote computer.
This software is useful for the all sort of organizations for example R&D
organizations, defense and secret service organizations etc. But our package is specially
build for service companies where they have to work for varied clients whose
information is very secret and must not be leaked in any case.

LITERATURE SURVEY
The literature survey for the current project started with the domain remote
access. Remote access is the ability to get access to a computer or a network from a
remote distance. Dial-up connection through desktop, notebook, or handheld computer
modem over regular telephone lines is a common method of remote access. Remote
access is also possible using a dedicated line between a computer or a remote local area
network and the “central” or main corporate local area network.
A remote access server is the computer and associated software that is set up to
handle users seeking access to network remotely. Sometimes called a communication
server, a remote access server usually includes or is associated with a firewall server to
ensure security and a router that can forward the remote access request to another part of
the corporate network. A remote access server may include or work with a modem pool
manager so that a small group of modems can be shared among a large number of
intermittently present access users. A remote access server may also be used as part of a
virtual private network (VPN).
The topic of REMOTE LOGGING was chosen for the current project. In the
Internet, users may want to run application programs at a remote site and create results
that can be transferred to their local site. One way to satisfy that demand and others is to
create a client/server application program for each desired service. Programs such as file

1
transfer programs (FTPs), email (SMTP), and so on are currently available. However, it
would be impossible to write a specific client/server program for each demand.
The better solution is a general-purpose client/server program that lets a user
access any application program on a remote computer; in other words, allow the user to
log on to a remote computer. After logging on, a user can use the services available on
the remote computer and transfer the results back to the local computer. A Remote Server
Access which is a surveillance system can view system activity and user actions (in real
time), shutdown/restart, and lockdown/freeze and even browse the file system of the
remote computer. Remote real–time surveillance enhance various activities like viewing
the desktop, transferring as well as accessing files, viewing the real time operations etc.
Remote access has different level of control over the client. Research papers regarding
this topic were obtained and the methods proposed in them are being implemented in this
paper accordingly.
Anis Ismail et al, proposed a Remote Administration Tool is a remote control
software that when installed on a computer it allows a remote computer to take control of
it. With remote control software you can work on a remote computer exactly as if you
were right there at its keyboard. With fast, reliable, easy-to-use pc from remote control
software, it lets you save hours of running up and down stairs between computers.
Remote control software allows you to take control of another PC on a LAN, WAN or
dial-up connection so you see the remote computer's screen on your monitor and all your
mouse movements and keystrokes are directly transferred to the remote machine. Remote
control software provides fast secure access to remote PC’s on Windows platforms.
Remote control software provides businesses the ability to login and access computers
remotely. Utilizing remote control software enables personnel to transfer files or folders
quickly and easily, and communicate by instant message, text chat, or voice intercom
from any PC, cell phone, wireless PDA. Remote administrator tool has no special
hardware requirements.
E. Tomur [2006] et al, proposed network architecture for providing secure access
to information resources of enterprise network from remote locations in a wireless
fashion. The proposed architecture offers a very promising solution for organizations
which are in need of a secure, flexible and cost-effective remote access methodology.
Security of the proposed architecture is based on Virtual Private Network technology and
a special role based access control mechanism with location and time constraints. The
flexibility mainly comes from the use of Internet as the communication medium and cost-
effectiveness is due to the possibility of in-house implementation of the proposed
architecture. In this paper, we present an architecture called WiSeR for implementing
Wireless Secure Remote access to resources of enterprise network. The proposed
architecture is product independent. WiSeR combines the security of VPN (Virtual
Private Network) technology with the flexibility of wireless access.
Jonathan Aldrich et al, presents the design and implementation of JEDI's simpler
approach utilizing dynamic proxies. The Java Environment for Distributed Invocation
(JEDI) is efficient, dynamic, and easier to use than alternative communication systems
for distributed Java objects. Existing state-of-the-art mechanisms for remote method calls
on Java objects, such as RMI, require users to perform a complicated series of steps.
Furthermore, the compiled static interfaces these systems use limit their functionality. We
will discuss and evaluate several existing systems, including RMI, CORBA, DCOM, and

2
Infospheres. These systems motivate the design of JEDI, a system that allows dynamic
method invocation (the ability to call any method of a remote object at run-time without
relying on statically compiled interfaces) and requires fewer development steps than
other existing systems.
Tristan [1998] et al, proposed RFB (“remote frame buffer”) a simple protocol for
remote access to graphical user interface. The protocol also makes the client stateless.
The input side of the protocol is based on a standard workstation model of a keyboard
and multi-button pointing device. Initial interaction between the RFB client and server
involves a negotiation of the format
and encoding with which pixel data will be sent. The RFB protocol can operate over any
reliable transport, either byte-stream or messagebased. There are two stages to the
protocol; an initial handshaking phase followed by the normal protocol interaction. This
protocol used for keeping the various action of the client. By regular checking the
framebuffer, we can access different operation in the buffer.
Christian Gilmore et al, presents the problem of secure remote access to a site's
internal web server from outside the firewall. The goal is to give authorized users access
to sensitive information, while protecting the information from others. We implemented a
solution using a one-time password scheme for client authentication and SSL for
confidentiality. Our main design considerations were security, performance, ease of use,
availability, and scale. We present Absent, a system for providing secure access to an
internal web server from outside
of the firewall. We make use of the secure socket layer (SSL) protocol to achieve
confidentiality and one-time passwords for user authentication. Absent is designed to
minimize change to our local infrastructure and to make use of off-the-shelf security
components.
Tom Wall et al, proposed an architecture that supports mobile Java Remote
Method Invocation (RMI) objects and describes an implementation of this architecture
and its performance. This architecture provides mobility support in the form of two main
components. The first is a session layer component that provides the low-level support
services required to maintain transport connections in a mobile environment. The second
is an application layer component that uses application-level proxies to address the
difficulties of invoking methods on mobile RMI servers.

PROPOSED METHOD:
The method consists of different stages: authentication, option frame module, RFB
protocol, Canvas class implementation.

Authentication
 Authentaction should also verify names with password.
 It should allow different type people with different level of rights.
 Changing password is a painful activity because of the use of descipher.

Authenticationpanel basically uses gridbag class layout to create the


authentication screen.
Step1: execute the program.

3
Step2: authenticationpanel will be called.
Step3:authentication screen will be created.
Step4:user asked to enter password.
Step5: user enters password.
Step6:control passes to descipher.

Descipher uses des algorithm for encryption and decryption of password.


Step1:control passes from authentication panel.
Step2:password entered is matched with the stored password.
Step3: if password is correct control passes to main class and user is

Options Frame Module

The options frame module is one of the major part of the entire design. It deals
with all the options which a user can have access to. It is called by the main function
which resides in the rnvviewer class.

RFB protocol:

The rfb proto class makes the client stateless. It basically establishes the
connection between the client and the server. The transfer of pixel data from one machine
to another machine is done through rfb protocol. The various aspects of the rfb protocol
are explaines in the subsequent sections. Rfb stands for remote frame buffer.

 It should be made sure that your encoding types and security types do not
clash.
 A client should never request a protocol version higher than that offered
by the server. It is intended that both clients and servers may provide some
level of backwards compatibility by this mechanism..
 Client should be stateless.

CANVAS CLASS IMPLEMENTATION

The Canvas Class is composed of colorModel, animated Memory Image Source,


processNormalProtocol and a handleEvent subcomponents.

 The color module implements the color of the canvas and also sets
the pixel format.
 The animatedMemoryImageSource module produces the image. It accepts
height, width of pixels and using other dimensions produces the
image.
 The processNormalProtocol is executed by the rfbThread to deal with the RFB
socket.
 The handleEvents module is for handling events like, because of a feature in
the AWT implementation over X, the rnvCanvas sometimes loses focus and the
only way to get it back is to call requestFocus() explicitly.

4
aaA

Find the authentication scheme

Write client initialization message

Read the server initialization message

Read the server message type

Read a Frame buffer Update message

Write Frame buffer Update Request, SetPixelFormat, Fix Color Map Entries, Set Encodings, Client C

Write a pointer event, key event message

5
APPLICATIONS:

In contrast to many recent Internet applications, which have focused on giving


user access to resources located anywhere in the world from their home computing
environments, Remote server access provides access to home computing environments
from anywhere in the world. Hence remote server access find their appilication in
following areas:
 To provide access to SwitchProbe Devices throughout the network from your
local network management console, regardless of where the agents are physically
located.
 To provide access and run interactive applications on remote systems.
 To provide users with a complete computational environment for controlling and
monitoring experiments, processing data, and solving structures.
 R&D organizations.
 Defense and secret service organization

REFERENCES:

[1] Junqing Liu, Jun Sun, Tianhao Li, “Signal Processing Systems Design and
Implementation”, 2005, IEEE workshop on volume, issue, 2-4 Nov, 2005.

[2] Huadong Li Yufang Zhong Mingguang Wu, Department of Control Science & Eng.,
Zhejiang Univ., Hangzhou, China  IEEE ,2009.

[3] Anis Ismail, Mohammad Hajjar, Haissam Hajjar, “REMOTE ADMINISTRATION


TOOLS: A COMPARATIVE STUDY”, Department of Computer Network and
Telecommunications Engineering University Institute of Technology – Saida, Journal of
Theoretical and Applied Information Technology.

[4] E. Tomur, R. Deregozu, T. Genc,“ A Wireless Secure Remote Access Architecture


Implementing Role Based Access Control: WiSeR”, World Academy of Science,
Engineering and Technology 18 2006.

[5] Jonathan Aldrich, James Dooley, Scott Mandelsohn, Adam Rifkin, “Providing Easier
Access to Remote Objects in Client-Server Systems”, California Institute of Technology.

[6] Tristan Richardson, Kenneth R. Wood, “The RFB protocol”, Version 3.3, January
1998.

[7] Christian Gilmore, David Kormann, Aviel D. Rubin, “Secure Remote Access to an
Internal Web Server”, AT&T Labs Research, Florham Park, NJ, USA.

[8] Tom Wall, Vinny Cahill, “Mobile RMI: Supporting Remote Access to Java Server
Objects on Mobile Hosts”, Broadcom Eireann Research Ltd, Dublin, Ireland, Department
of Computer Science, University of Dublin, Trinity College.

6
7

You might also like