9th International Conference on Computer Science and Information Technology (CCSIT 2019) 2019
DOI: 10.5121/csit.2019.90806
|View full text |Cite
|
Sign up to set email alerts
|

Intranet Security Using A LAN Packet Sniffer to Monitor Traffic

Abstract: This paper was designed to provide Intranet traffic monitoring by sniffing the packets at the local Area Network (LAN) server end to provide security and control. It was implemented using five computer systems configured with static Internet Protocol (IP) addresses used in monitoring the IP traffic on the network by capturing and analyzing live packets from various sources and destinations in the network. The LAN was deployed on windows 8 with a D-link 16-port switch, category 6 Ethernet cable and other LAN de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0
2

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 2 publications
0
2
0
2
Order By: Relevance
“…This section discusses the related work of various authors. Henry & Agana [3] monitored the Intranet traffic by sniffing the packets at the Local Area Network (LAN) server end to provide security and control. They analyzed the IP and MAC address sources and destinations of the frames, Ethernet, UDP, and HTTP protocols and concluded that these can assist network administrators to make informed decisions on possible threats that the network can be exposed to.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This section discusses the related work of various authors. Henry & Agana [3] monitored the Intranet traffic by sniffing the packets at the Local Area Network (LAN) server end to provide security and control. They analyzed the IP and MAC address sources and destinations of the frames, Ethernet, UDP, and HTTP protocols and concluded that these can assist network administrators to make informed decisions on possible threats that the network can be exposed to.…”
Section: Related Workmentioning
confidence: 99%
“…Active sniffers can send data in the network and can be detected by other systems through different techniques whereas passive sniffers only collect data, but cannot be detected. Wireshark is a passive network sniffer [3]. Moreover, the structure of a packet sniffer consists of two parts: the packet analyzer which works on the application layer protocol, and the packet capture (pcap) which captures packets from all other layers [4].…”
Section: Introductionmentioning
confidence: 99%
“…Sedangan menurut [30] informasi yang didapat dari sniffing paket dapat digunakan oleh seorang administrator untuk mengidentifikasi paket yang aneh dan juga untuk menjaga transmis data pada jaringan agar tetap efisien. Penelitian [31] melakukan sniffing paket dengan parameter Media Access Control (MAC) Address sumber dan tujuan, Ethernet Addresses, Ip Addresses User Datagram Protocol (UDP) dan Hypertext Transfer Protocol (HTTP), sedangkan penelitian yang dilakukan oleh [32] Jumlah user yang mengakses intenet, bandwidth serta besar paket yang digunakan Merujuk pada penelitian sebelumnya, penelitian ini juga menghasilkan dataset dengan cara sniffing paket dengan menghasil 16 atribut yang terdiri dari waktu, protokol, IP sumber dan tujuan, port Sumber dan tujuan, ACK, SEQ, WIN, Flags, TTL, IP Length, IP_Ceksum, IP_ID, IP_OFF, TCP/UDP. Untuk proses sniffing paket penelitian ini tersaji pada gambar 8, dimana komputer yang didefiniskan sebagai capture paket data harus terlebih dahulu ini mendefenisikan interface yang digunakan, dan output menghasilkan "file.pcap".…”
Section: Packet Sniffingunclassified
“…Wireshark es uno de los analizadores de paquetes de código abierto más populares. Originalmente se llamaba Ethereal, pero en mayo de 2006 el proyecto pasó a llamarse Wireshark por cuestiones de marca [14].…”
Section: Bpasos Para La Captura De Datosunclassified