packet capture
Recently Published Documents


TOTAL DOCUMENTS

76
(FIVE YEARS 16)

H-INDEX

6
(FIVE YEARS 2)

Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3084
Author(s):  
Adrian-Tiberiu Costin ◽  
Daniel Zinca ◽  
Virgil Dobrota

Capturing traffic and processing its contents is a valuable skill that when put in the right hands makes diagnosing and troubleshooting network issues an approachable task. Apart from aiding in fixing common problems, packet capture can also be used for any application that requires getting a deeper understanding of how things work under the hood. Many tools have been developed in order to allow the user to study the flow of data inside of a network. This paper focuses on documenting the process of creating such tools and showcasing their use in different contexts. This is achieved by leveraging the power of the C++ programming language and of the libtins library in order to create custom extensible sniffing tools, which are then used in VoIP (Voice over IP) and IDS (Intrusion Detection System) applications.


2020 ◽  
Vol 5 (2) ◽  
pp. 21-27
Author(s):  
Nur Khairani Kamarudin ◽  
Nur Syafiqa Bismi ◽  
Nurul Hidayah Ahmad Zukri ◽  
Mohd Faris Mohd Fuzi ◽  
Rashidah Ramle

VoIP application usage has increased from time to time and makes our daily life more convenient. VoIP application has features to make a phone call, send a text message and share the file through the apps for free. However, most of the users did not seem aware of VoIP security features such as authentication ability, password encryption ability, or voice or audio and text communication encryption ability. It is essential to ensure the VoIP used is secure from password decrypter and eavesdrops the user conversation. Thus, the first objective of this research was to study and investigate VoIP application consist of Kakao Talk, Telegram, Facebook Messenger and WhatsApp for both Android and web application. The second objective was to evaluate the four VoIP application identified based on authentication requirement, password encryption, voice or audio encryption communication, and text encryption communication. There were two mobile phones used. One acts as a client and a personal computer act as an attacker. Wireshark and packet capture were run in personal computer and mobile phone to monitoring and scanning the network traffic while both devices connected in the same WLAN. The experiment implements MITM, interception, and sniffing attacks. This research project has identified Facebook Messenger and WhatsApp web application do not provide secure password ability.


Electronics ◽  
2019 ◽  
Vol 9 (1) ◽  
pp. 40 ◽  
Author(s):  
Su Jun ◽  
Krzysztof Przystupa ◽  
Mykola Beshley ◽  
Orest Kochan ◽  
Halyna Beshley ◽  
...  

The development was carried out using the Qt5.2 integrated development environment, which uses the programming language C++. The main advantage of this environment is that the code written in it can be compiled to different platforms (for example, Windows, Linux, Mac OS). A software router based on a modular architecture has been developed. It uses the socket technology, which allows forming a program-oriented packet network with any topology, including full-coupled topology. A network traffic generator to test the developed software router has been designed. We proposed a scheme to measure the packet processing time of a router using a specialized packet-capture network interface cards (NIC 1 and NIC 2) and a novel traffic generator installed on PC. Based on an experimental test bed we confirmed that our software router provides a cost-efficient alternative to the expensive, special hardware router CISCO 2801.


2019 ◽  
Vol 2 (01) ◽  
pp. 13-18
Author(s):  
Agustini Rodiah Machdi

Virtual Router Redundancy Protocol (VRRP) was developed to eliminate internal failures a single node gateway system, causing a network link to be disconnected. VRRP is capable provide redundant routing path link access. This time the research applied technology This VRRP is on a home network or building that utilizes the electricity installation network as LAN (Local Area Network) commonly called HomeGrid, and test it by doing QoS metric measurement. The QoS values obtained are then compared to the QoS standard on TIPHON as proof that network conditions are still in normal limits. The system is tested using 3 (three) schemes to get maximum results. Condition network using this VRRP system only requires very short downtime, when viewed from packet capture monitoring takes only 3 to 4 seconds in all schemes. Thus the technological capabilities of the VRRP system have been tested and are capable provide high availability linksVirtual Router Redundancy Protocol (VRRP) was developed to eliminate internal failures a single node gateway system, causing a network link to be disconnected. VRRP is capable provide redundant routing path link access. This time the research applied technology This VRRP is on a home network or building that utilizes the electricity installation network as LAN (Local Area Network) commonly called HomeGrid, and test it by doing QoS metric measurement. The QoS values obtained are then compared to the QoS standard on TIPHON as proof that network conditions are still in normal limits. The system is tested using 3 (three) schemes to get maximum results. Condition network using this VRRP system only requires very short downtime, when viewed from packet capture monitoring takes only 3 to 4 seconds in all schemes. Thus the technological capabilities of the VRRP system have been tested and are capable provide high availability linksJournal of Science Innovare is licensed under  Keywords: VRRP;Mikrotik;Router;JPerf;QoS;jitter


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3930-3933

The field of security Visualisation is an interesting and tough field of research. Enormous amount of (big) data is involved in the networking of devices. In order to analyse and get data for solving the problem, visualisation can be very helpful. Combination of security world as well as the network world is discussed in this paper. Identifying various visualisation techniques for security log data and executing workflow based composition of multiple analytic components will be identified. Interactive modes of the techniques will be discussed. Making the security files to be readable and the format for analysing are identified. More network visualisation tool allows the security analysts to quickly examine the large amount of information by rendering a millions of events and log entries in a single graphical view. Extracting files from full packet captures can save security analyst a great deal of time. There are tools available for capturing PCAP(Packet Capture) files. This PCAP files will be analysed for further details. In the proposed solution, the PCAP files will be generated with the help of Wireshark and it will be processed with the help of Apache drill for converting it into a readable format and the Visualisation can be done with R Studio. Various Visualisation tools in R will be used to visualise the PCAP files. This in order will thoroughly give some insight on the log files for any detection and prediction of malicious data.


Sign in / Sign up

Export Citation Format

Share Document