Unauthorized device detection tool
Why Choose This Project
With the rise of BYOD (Bring Your Own Device) and networked environments, unauthorized devices connecting to corporate networks pose a serious security threat. Rogue devices can be used for data exfiltration, malware distribution, or unauthorized access. This project detects and alerts administrators about unauthorized or unknown devices on a network, helping organizations maintain network integrity and compliance.
What You Get
-
A network monitoring platform to detect connected devices.
-
Real-time identification of authorized vs unauthorized devices.
-
Alerts and notifications for rogue devices attempting to access the network.
-
Device tracking by IP, MAC address, hostname, and connection timestamp.
-
Reports and dashboards for network administrators to review device activity.
Key Features
| Feature | Description |
|---|---|
| Device Discovery | Scan the network for all connected devices. |
| Authorized Device List | Maintain a list of approved devices based on MAC/IP addresses. |
| Unauthorized Device Detection | Compare detected devices against the approved list. |
| Real-Time Alerts | Notify administrators of rogue devices via email/SMS. |
| Device Metadata | Record device info including IP, MAC, hostname, OS, and connection time. |
| Logging & Reporting | Keep a historical log of all detected devices for audits. |
| Dashboard Visualization | Display active devices, unauthorized attempts, and trends. |
| Access Control Integration | Optionally trigger network access restrictions for unauthorized devices. |
Technology Stack
Frontend Layer
-
HTML, CSS, JavaScript
-
Bootstrap for responsive UI
-
Optional: React.js for dynamic dashboards
Backend Layer
-
Node.js (Express) / Java Spring Boot / Python Flask
-
Handles device scanning, logging, and alert generation
Database Layer
-
MongoDB / MySQL / PostgreSQL for storing device logs and authorized device info
Security Layer
-
HTTPS for secure dashboard access
-
JWT / OAuth2 for admin authentication
-
Role-based access for monitoring dashboards
Optional Libraries & APIs
-
Network scanning libraries (Node.js:
node-nmap, Python:scapy/python-nmap) -
Email/SMS API (Nodemailer, Twilio) for alerts
-
Cron jobs for scheduled scanning
Working Flow
-
Network Scan
-
Periodically scan the network for all connected devices using IP and MAC addresses.
-
-
Device Verification
-
Compare detected devices against a pre-approved list of authorized devices.
-
-
Alert Generation
-
Trigger email/SMS alerts when unauthorized or unknown devices are detected.
-
-
Logging & Audit
-
Record all detected devices and alerts in a database for auditing purposes.
-
-
Dashboard Visualization
-
Display a real-time view of connected devices, including unauthorized attempts and trends.
-
Main Modules
-
Device Scanner Module → Detect all devices on the network
-
Authorization Module → Maintain and verify authorized device list
-
Alert Module → Send notifications for unauthorized devices
-
Dashboard Module → Visualize devices and alerts
-
Reporting Module → Export device logs and generate audit reports
Security Features
-
Role-based admin access
-
Secure HTTPS connection for dashboard
-
Encrypted storage of device logs
-
Real-time alerts for unauthorized access attempts
-
Scheduled scanning to prevent blind spots in network monitoring