2018
DOI: 10.5815/ijcnis.2018.07.02
|View full text |Cite
|
Sign up to set email alerts
|

Ethical Network Surveillance using Packet Sniffing Tools: A Comparative Study

Abstract: Nowadays, with growing of computer's networks and Internet, the security of data, systems and applications is becoming a real challenge for network's developers and administrators. An intrusion detection system is the first and reliable technique in the network's security that is based gathering data from computer network. Further, the need for monitoring, auditing and analysis tools of data traffic is becoming an important factor to increase an overall system and network security by avoiding external attacker… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…We tried to capture information and find the highest performance by attacking our attack vector methods. In addition, we wanted to understand the hardware implementation in IoT networks [3], find an effective sniffing vulnerabilities [4] and to figure out the structure of work of low energy devices and their weak points.…”
Section: Related Workmentioning
confidence: 99%
“…We tried to capture information and find the highest performance by attacking our attack vector methods. In addition, we wanted to understand the hardware implementation in IoT networks [3], find an effective sniffing vulnerabilities [4] and to figure out the structure of work of low energy devices and their weak points.…”
Section: Related Workmentioning
confidence: 99%
“…The method used is sending data between 2 computers with the same operating system. By using jumbo frames, data traffic is expected to be more stable [30]- [36]. Peer-to-peer performace testing has been proposed by [37] with Windows and Linux platform without passing some sort of connections from couple router hardwares.…”
Section: Introductionmentioning
confidence: 99%