Abstract
Problem statement: Viruses and hacker attacks typically generate a recognizable pattern or “signature” of packets. Most of Network Traffic Analyzer can identify these packets and alert the administrator to their presence on the network via email or page. Approach: Most traffics analyzers let you set alarms to be triggered when a particular pattern is seen. Results: Some network traffic analyzers can be programmed to send an email or page when these conditions are met. Of course; this assumes that the virus and its signature have been seen before and incorporated the analyzer’s list of packet filters. ((The packet filters once started the filtering process and also by using packet decode together they can determine the traffic type whether it has normal or abnormal activities. Conclusion/Recommendations: In this study we used Packet Generator to generate a traffic that supposes to act the intruder or hacker signature to prove up that Network Traffic Analysis has the ability to detect like this kind of traffics. And also we have explained in depth about network traffic analysis and its ability to monitor all the network traffics (incoming and outgoing) and view their headers and payload and all other information such as traffic source and destination)).
Highlights
Generating the most traffic, what protocols are in use, where is the traffic originating from or where is the This research is a web-based network traffic destination of the traffic can be very important to analyzer using to generate instant reports on network solving congestion problems
Accurate details on data analysis, administrators spend a lot of time, trying, to know what data interpretation and graphical presentation of results is degrading the performance of their network to correlates them and generates graphs and reports that
The alternative solution to this problem is to deploy a scalable network traffic monitoring and analysis system, in order to understand the dynamics of Ashfaq et al, 2008; Babcock et al, 2003; Chen et al, the traffic and changes in the internet from time to time 2004; Bon, 2009; Tan and Sherwood, 2006)
Summary
Generating the most traffic, what protocols are in use, where is the traffic originating from or where is the This research is a web-based network traffic destination of the traffic can be very important to analyzer using to generate instant reports on network solving congestion problems. It's a cruel sarcasm in information security that many of the features that make using computers easier or more efficient and the tools used to protect and secure the network can be used to exploit and compromise the same computers and networks This is the case with packet sniffing, because once we capture packets using packet sniffer, this packet and its data after that has to be filtered before it goes to be stored in the data base. TCPdump prints out the headers of packets on a network interface that match the Boolean expression It is a network sniffer with in-built filtering capabilities; it can only collect the data from the. As useful and powerful as TCPdump is, it is only suitable for troubleshooting i.e., for tracking network and protocol related connectivity problems
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.