ARCHIVES

Research Article

Automated Comprehensive Port and Traffic Analysis

A. Richard William1Pooja C2Nandhini M3Neelavathi C4Promodini S5

¹Assistant Professor, Department of Information Technology, Er. Perumal Manimekalai College of Engineering, Hosur, Tamilnadu, India. ²³⁴⁵ Department of Information Technology, Er. Perumal Manimekalai College of Engineering, Hosur, Tamilnadu, India.

Published Online: May-August 2024

Pages: 131-135

Abstract

Packet analysis is a primary trace back technique in network forensics, Packet analysis, often referred to as packet sniffing or protocol analysis, describes the process of capturing and interpreting live data as it flows across a network in order to better understand what is happening on that network. This can be used to find traces of nefarious online behavior, data breaches, unauthorized website access, malware infection, and intrusion attempts, and to reconstruct image files, documents, email attachments, etc. sent over the network. Packet analysis is typically performed using a packet sniffer, a tool used to capture raw network data going across the wire. Wireshark proves to be an effective open-source tool in the study of network packets and their behavior. In this regard, Wireshark can be used in identifying and categorizing various types of attack signatures. It lets administrator to see what’s happening on network at a microscopic level. The purpose of this paper is to demonstrate how Wireshark is applied in network protocol diagnosis and can be used to find some basic indicators of compromise for a malware.

Related Articles

2024

Revolutionizing User Interfaces: Exploring the Latest Trends in Front-End Development

2024

Website Development in Computer Science: Unveiling the Digital World

2024

Review on RSA Cryptography, Steganography and Compression Techniques for Data Security

2024

Comparative Analysis of Program Execution Time Required by Python, R and Julia Compiler

2024

Online Auction App

2024

Paw some Connection: Pet Adoption and Donation

2024

Beyond Extractive Methods – Navigating the landscape of Abstractive Summarization Methods

2024

Parallel Processing in Hybrid Encryption Using AES and RSA

2024

Footwear-Based Assistive Technology for Lower Limb Amputees

2024

Student Portal Application

Automated Comprehensive Port and Traffic Analysis | INDJCST | INDJCST