2014
DOI: 10.5120/16391-5975
|View full text |Cite
|
Sign up to set email alerts
|

An Insight in to Network Traffic Analysis using Packet Sniffer

Abstract: Slowdown in the network performance can cause serious concern to network analysts, leading to loss in resources. Such cases are not easy to deal with, due to the lack of time and resources available. Lack of awareness about appropriate tools which detect the attacks or not knowing exactly why a loss in network performance is occurring are some other factors. Connectivity loss or shutting down of terminals within the network for unknown reasons are among the other problems. Mostly, the cause of these problems c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0
2

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 2 publications
0
8
0
2
Order By: Relevance
“…Pallavi Asrodia et al [1] in their paper have given more focus on the basics of packet sniffing. They have given the knowledge about the various principles on which the packet sniffer works, what are different approaches, and how these approaches work.…”
Section: Literature Surveymentioning
confidence: 99%
“…Pallavi Asrodia et al [1] in their paper have given more focus on the basics of packet sniffing. They have given the knowledge about the various principles on which the packet sniffer works, what are different approaches, and how these approaches work.…”
Section: Literature Surveymentioning
confidence: 99%
“…In all these cases, knowing the sources of the attacks is the first step towards taking appropriate action in achieving correct protection. A good way of achieving correct protection is by using a trusted packet sniffer such as Wireshark, formerly known as Ethereal, whose prime objective is networking troubleshooting, analysis, and networking research [6].…”
Section: Introductionmentioning
confidence: 99%
“…VPN network implementation with Point to Point Tunneling Protocol method is an alternative solution. This method can help connect different networks in a private network that is safe against sniffers [4].…”
Section: Introductionmentioning
confidence: 99%