Network Monitoring and Analysis by Packet Sniffing Method (original) (raw)

.ONLINE NETWORK MONITORING AND PACKET TRAFFIC ANALYSIS USING SNIFFER APPLICATION (2)

2022

Network analysis is the process of capturing network traffic and inspecting it closely and determine what happened on the network. The data packets of popular protocols are decoded by a network analyzer, which then shows the network traffic in readable format. A sniffer is a program that keeps track of data as it travels across a network. This study aims on the design and development of a virtual real time intranet networks monitoring using packet sniffing, provide accurate evidence on corporate fraud when investigation is being carried out in an organization. These network analyzers converts raw binary data into human-readable format which helps to analyze the network. The methodology adopted and implemented was the Object Oriented Analysis and Design Methodology (OOADM). C# with SQL was used as a programming language to develop this system.

. ONLINE NETWORK MONITORING AND PACKET TRAFFIC ANALYSIS USING SNIFFER APPLICATION

Network analysis is the process of capturing network traffic and inspecting it closely and determine what happened on the network. The data packets of popular protocols are decoded by a network analyzer, which then shows the network traffic in readable format. A sniffer is a program that keeps track of data as it travels across a network. This study aims on the design and development of a virtual real time intranet networks monitoring using packet sniffing, provide accurate evidence on corporate fraud when investigation is being carried out in an organization. These network analyzers converts raw binary data into human-readable format which helps to analyze the network. The methodology adopted and implemented was the Object Oriented Analysis and Design Methodology (OOADM). C# with SQL was used as a programming language to develop this system.

Packet Sniffer – A Comparative Study

2014

Packet Sniffer is a tool which captures all the packets on the network irrespective of the final destination of the packet. Packet Sniffer could be used to monitor the bottlenecks in the network, alarm the irregular behaviour in the network, capture passwords and VoIP from any system in that network. This paper gives a brief introduction of what is a packet sniffer, its structure and what is its working. Then key features of top packet sniffing tools (i.e. Wireshark, TCPdump and Colasoft Capsa) are discussed. Further, the above tools are compared on the basis of characteristic behaviour and quantitative parameters. Finally, one gets the best tool amongst these three in a particular situation.

Network traffic analysis and intrusion detection using packet sniffer

2010

Computer software that can intercept and log traffic passing over a digital network or part of a network is better known as packet sniffer. The sniffer captures these packets by setting the NIC card in the promiscuous mode and eventually decodes them. The decoded information can be used in any way depending upon the intention of the person concerned who decodes the data (i.e. malicious or beneficial purpose). Depending on the network structure one can sniff all or just parts of the traffic from a single machine within the network. However, there are some methods to avoid traffic narrowing by switches to gain access to traffic from other systems on the network. This paper focuses on the basics of packet sniffer and its working, development of the tool on Linux platform and its use for Intrusion Detection. It also discusses ways to detect the presence of such software on the network and to handle them in an efficient way. Focus has also been laid to analyze the bottleneck scenario arising in the network, using this self developed packet sniffer. Before the development of this indigenous software, minute observation has been made on the working behavior of already existing sniffer software such as wireshark (formerly known as ethereal), tcpdump, and snort, which serve as the base for the development of our sniffer software. For the capture of the packets, a library known as libpcap has been used. The development of such software gives a chance to the developer to incorporate the additional features that are not in the existing one.

An Insight in to Network Traffic Analysis using Packet Sniffer

Slowdown in the network performance can cause serious concern to network analysts, leading to loss in resources. Such cases are not easy to deal with, due to the lack of time and resources available. Lack of awareness about appropriate tools which detect the attacks or not knowing exactly why a loss in network performance is occurring are some other factors. Connectivity loss or shutting down of terminals within the network for unknown reasons are among the other problems. Mostly, the cause of these problems cannot be detected accurately and is concluded due to poor network architecture, such as inefficiently configured broadcast storms, spanningtree, usage of unsuitable routing protocols within the network domain, redundant links etc. However, sometimes the cause could be due to attacks by unknown third parties that try to put the web server out-of-service through means of a DoS (Denial of Service) attack, sending traffic with a poisoned ARP in an attempt to discover hosts to infect, or by simply infecting ports with malware to form part of an alien network or botnet. In all these cases, knowing the source of the attack is the first step towards taking appropriate action and achieving correct protection. That is when packet sniffers can be extremely useful to detect, analyze and map traffic. Such packet sniffers identify threats to the network and limit their harmful consequences.

Discrete Analysis and Modern Assessment of Packet Sniffer and Network Monitoring Tools-A Comparative Survey

Network monitoring signifies to the practice of managing the procedure of a computer network using specified management software tools. As network persist to grow,it isvery important that network administrators are responsive of the various types of traffic that is navigating their networks ,and offers appropriate resources for decision making system. Network monitoring systems are operated to confirm availability and inclusive enactment of computers and network facilities. In modern days there are more than billions of packets moving throughout the web sky. A significant numbers of them are of malicious focused. These packets assist us to comprehend when there are prominent security or presentation procedures occurring on the network and also to find out collective network complications such as loss of connectivity and slow network etc. These paper emphases on the comparative study of diverse packet analyzers, that are accessible in current market and how we can select amongst them rendering to our necessities. Network monitoring for a commercial network is a analytical IT function that can save money in network functioning, employee efficiency and organization cost overruns. Traffic monitoring and analysis is very important in order to more efficiently troubleshoot and solve issues when they happen. A number of tools are accessible to help administrators to monitor and evaluation of network traffic in network. This paper presents a comparative analysis of some present packet sniffers with their functioning.

Packet Sniffer – A Comparative Characteristic Evaluation Study

Proceedings of the 2015 InSITE Conference

As network continue to grow it is increasingly important that network administrators are aware of the different types of traffic that is traversing their networks as well as provides sufficient means for decision making process. Traffic monitoring and analysis is essential in order to more effectively troubleshoot and resolve issues when they occur, so as not to bring network services to a stand still for extended periods of time. Numerous tools are available to help administrators with the monitoring and analysis of network traffic. This paper present a comparative analysis of five existing packet sniffers vis-à-vis their performance.

Ethical Network Surveillance using Packet Sniffing Tools: A Comparative Study

International Journal of Computer Network and Information Security

Nowadays, with growing of computer's networks and Internet, the security of data, systems and applications is becoming a real challenge for network's developers and administrators. An intrusion detection system is the first and reliable technique in the network's security that is based gathering data from computer network. Further, the need for monitoring, auditing and analysis tools of data traffic is becoming an important factor to increase an overall system and network security by avoiding external attackers and monitoring abuse of the IT assets by employees in the workplace. The techniques that used for collecting and converting data to a readable format are called packet sniffing. Packet Sniffer is a tool that used to capture packets in binary format, converts that binary data into a readable data format and log of that captured data for analyzing and monitoring, displaying different used applications, cleartext user names, passwords, and other vulnerabilities. It is used by network administrator to keep the network is more secured, safe and to support better decision. There are many different sniffing tools for monitoring, analyzing, and reporting the network's traffic. In this paper we will compare between three different sniffing tools; TCPDump, Wireshark, and Colasoft according to various parameters such as their detection ability, filtering, availability, supported operating system, open source, GUI, their characteristics and features, qualitative and quantitative parameters. In addition, this paper may be considered as an insight for the new researchers to guide them to an overview, essentials, and understanding of the packet sniffing techniques and their working.

A New Hybrid Network Sniffer Model Based on Pcap Language and Sockets (Pcapsocks)

International Journal of Advanced Computer Science and Applications, 2016

Nowadays, the protection and the security of data transited within computer networks represent a real challenge for developers of computer applications and network administrators. The Intrusion Detection System and Intrusion Prevention System are the reliable techniques for a Good security. Any detected intrusion is based on data collection. So, the collection of an important and significant traffic on the monitored systems is an interesting feature. Thus, the first task of Intrusion Detection System and Intrusion Prevention System is to collect information's basis to treat and analyze them, and to make accurate decisions. Network analysis can be used to improve networks performances and their security, but it can also be used for malicious tasks. Our main goal in this article is to design a reliable and powerful network sniffer, called PcapSockS, based on pcap language and sockets, able to intercept traffic in three modes: connected, connectionless and raw mode. We start with the performances assessment performed on a list of most expanded and most recently used network sniffers. The study will be completed by a classification of these sniffers related to computer security objectives based on parameters library (libpcap/winpcap or libnet), filtering, availability, software or hardware, alert and real time. The PcapSockS provides a nice performance integrating reliable sniffing mechanisms that allow a supervision taking into account some low and high-level protocols for TCP and UDP network communications.