Using Netflow Protocols to Identify and Assess the Network Packet Flows in Unsecured Network Environments

The Network Packet Flow is analyzed and defined by the network administers in the company to assure the exact data flow in the networked systems. Currently, in the world the data flow is unreliable in the internet because of unreliability of the internet. So in My research I dully answered to identify and asses the network administrator can record the ingress and egress of the packet flow-in and flow-out in the routers respectively. Therefore the network environment is reliable, identified and assessed by using the network simulators called packet tracer and the protocol of NETFLOW protocol implementation in this research works.


INTRODUCTION
In the computer network environments there is unsecured network is familiar in the world. Therefore, it's most often refers to a free temporary LAN users, Wi-Fi (wireless) network, like at a coffeehouse, retail store. It means there's no special login or screening process to get on the network, which means you and anyone else can use it. So that it means to you is that there's no guarantee of security while you use that network not secured). So, if a hacker or false network users were nearby and felt like doing dirty deeds online on that unsecure network, there's very little that can stop him. Most of the time as we have faced in different organization we've all used free Wi-Fi by Laptop other smart phones, we all accessed our systems as temporarily and others in different environments like Cafe, Airport, Mall, city centers, public library, and even if inside rails. In these bad environments there is packet flows in and out of source and destinations i.e. the packet flow, is run through the IP process to segment the stream into a consistent packet data structure, which is easily routed through network paths. In generally the network packets is nothing but it's the data which flows from the sender to receivers. Packets enable resilient network designs by creating uniform, stateless, independent data chunks. Packet networking has been the preferred method for networking for the last 20 years (but it's not only one). The use of packets remains a sound technical concept for abstracting the forwarding path from the payload, Focus on the network, don't be concerned about the data. But consider common use cases for the network. The user wants to see a Web page load smoothly and quickly. The Web developer wants the Web browser to request an image, an HTML file or a script file from the Web server and load rapidly. For a sys admin, the OS opens a socket to manage a connection to a remote system and to stream data through it. These use cases are all about flows of data, but the network supports the delivery as a series of packets. And consider the hosts at either end of the connection. In the past, servers were always located on a single port of a switch. Clients were located at a specific WAN connection or on a specific switch in the campus LAN. Packets ingressed(incoming) and egressed(outgoing)the network at known locations and the ports. Packet assessing and identifying is based on the following basic requirements of A network flow is identified as a unidirectional stream of packets between a given source and destination-both are defined by a network-layer IP address and by transport-layer source and destination port numbers. Specifically, a flow is identified as the combination of the following key fields are basics to identify the packets, to identify who sends to whom, on which times and other statistics of the network flows in detail.
 Source IP address  Destination IP address  Source port number  Destination port number  Layer 3 protocol type

II. +METHODOLOGY
To gather each and every statistics of the network packet in our research we used free and open source software called Cisco Packet tracer which is Versions 6.1 as the simulators, as it mentioned in our experimental results in Fig.2 in below. The protocols that we have implemented in the research work is called NetFlow Protocol which is used to captures data from ingress (incoming) and egress (outgoing) packets. NetFlow gathers statistics of each packet sent and received at what times from which remotes sites. The following ingress IP packets identified by protocol: IP-to-IP packets IP-to-Multiprotocol Label Switching (MPLS) packets Frame Relay-terminated packets ATM-terminated packets As it mentioned, in the Fig 2. The protocols which identifies data incoming and outgoing from the router by Fast Ethernet port (FE0 or FE0). The statistics of the overflow is captured in the memory of router called DRAM.

International Journal of Advanced Engineering Research and Science (IJAERS)
[

III. RESULTS AND EXPERIMENTAL WORKS
In this study we have used the Packet tracer version 6.1. For the experimental simulation of how the NetFlow protocol is implemented in the real networks and how it's used to monitor and manage the organizational network to create secured network environments. So, we have done the following steps in our works: Step 01: Designing the network by using Packet tracer: for this study we have used one router with Fa0/0, DHCP server, Switch, PCs with 24 ports and straight through cables to connect the devices, and also Laptop computer with Console cables to configure the Protocols and network.
Step 02: Configuring the networks by using cisco commands [In this research we have configured the DHCP server and PCs, RouterFa 0/0 with IPAddress 192.168.1.1, 255.255.255.0] Steps 03:Sending messages from one devices to another [we sent from Pc to PC, Router -PCs..etc] Step 04: Monitoring the networks by using the Network statistics

International Journal of Advanced Engineering Research and Science (IJAERS)
[ Vol-4, Issue-12, Dec-2017]  https://dx.doi.org/10.22161/ijaers.4.12.9  ISSN: 2349-6495(P) | 2456-1908(O) switches. Deep packet inspection (DPI) applies to technologies that use packets as a data source and then extract metadata such as application or website names. In contrast, flow data in most cases does not provide any information about what is contained within packet payloads. This network flow based analysis is working on the NetFlow v9 and Internet Protocol Flow Information Export (IPFIX) are available on some Cisco Integrated Services Routers (ISRs) and Cisco ASR 1000 Series Aggregation Services Routers (ASR1ks) with Next Generation Network based Application Recognition (NBAR2) enabled.[1,3,6]. When Network admin has to manage an increasingly complex IT environment, ensuring the reliability, availability and security of business services has become very demanding. Simple Network Management protocol (SNMP) monitoring is not enough anymore. Therefore to answer those challenges mentioned in above admin should have monitor each and every flow of the networks in and out of an organizations by using different methods as like We implemented protocols NetFlow. In general, NetFlow is rooted instrumentation within Cisco IOS Softwareof routers and cisco switches to characterize network operation. Visibility into the network is anvital tool for IT professionals. In short, new requirements and pressures, network operators are finding it critical to understand how the network is behaving including: [4,5,8]  Application and network usage  Network productivity and utilization of network resources  The impact of changes to the network  Network anomaly and security vulnerabilities  Long term compliance issues 5. Conclusion: The NetFlow protocol is vital in unsecured networks environments which are used to monitor the traffic or packets flows, traffic analysis, security monitor, devices reporting and overall statistics of the networks. Therefore in this study we dully covered the protocol uses and services like we have designed the networks, we have configured the NetFlow protocol in the supportive router by using packet tracer simulator, we have seen the packet passing inside the devices and lastly by using the commands the results of network packet flow statistics is displayed. Generally the network admin should have implemented this protocol in any organizations to secure and monitor the entire network of organizations.