sniffing technique
Recently Published Documents


TOTAL DOCUMENTS

9
(FIVE YEARS 3)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
Ilham Firdaus ◽  
Januar Al Amien ◽  
Soni Soni

Sniffing technique (ARP Spoofing) is an attack that sends fake ARP packets or ARP packets that have been modified according to the network address attacker's to poison the victim's ARP cache table. ARP spoofing attack is a dangerous attack because it can monitor the activities of victims in searching the browser and can steal social logins, office and other accounts. This attack supports the occurrence of other computer network attacks such as Denial of service, Man in the middle attack, host impersonating and others. Sniffing attacks are generally found in places that provide public Wi-Fi such as campus, libraries, cafes, and others. IDS Snort can detect sniffing attacks (Arp Spoofing). String Matching Method KMP algorithm is applied to detect attacks on snort logging files to provide alerts (messages) to users. Tests carried out are black box testing to test application functionality, and accuracy testing. All application functionality was successful, and testing the accuracy of the match between manual calculations for string matching and accurate application.


2020 ◽  
Vol 202 ◽  
pp. 15003
Author(s):  
Kagiraneza Alexis Fidele ◽  
Suryono ◽  
Wahyul Amien Syafei

Network-based intruders such as (DoS) attacks have become one of the most significant internet interruptions. Some operations that rely on the internet, such as banking transactions, education, trade marketing, and social networking, have become the primary targets. The attacker is trying to surround and making it difficult for the system to defend. The research's objective is to recognize the characteristics and level of DoS attacks. In understanding the behavior of intruders against a target web server, Wireshark was used in all traffic networks—capturing the traffic in a networked environment. In this research, the user identifies the attack levels (TCP SYN, UDP, and HTTP protocol), ranging from low (Q1), medium (Q2), and high (Q4) attacks. The approach is to simulate the TCP, HTTP, and UDP flood attacks and analyze the attacks' effects on the network environment. In this work, normal scenarios and pattern attacks were compared. In this case, the intruder floods unwanted packets to the victim with a massive number of request packets; the SYN from the corresponding SYN-ACK replies are not achieved. This paper will identify the DoS attacks level and analyze the behavior of traffics.


2019 ◽  
Vol 125 ◽  
pp. 21004
Author(s):  
Kagiraneza Alexis Fidele ◽  
Agus Hartanto

Nowadays, we are entering an era where the internet has become a necessary infrastructure and support that can be applied as a means of regular communication and data service. In these services, cloud-based on servers has an essential role as it can serve numerous types of devices that are interconnected with several protocols. Unfortunately, internet cloud servers become the main target of attacks such as Denial of Service (DoS), Distributed Denial of Service (DDoS). These attacks have illegal access that could interfere in service functions. Sniffing techniques are typically practiced by hackers and crackers to tap data that passes through the internet network. In this paper, sniffing technique aims to identify packets that are moving across the network. This technique will distinguish packet on the routers or bridges through a sniffer tool known as snort connected to a database containing the attack pattern. If the sniffing system encounters strange patterns and recognizes them as attacks, it will notify to the firewall to separate the attacker's original Internet Protocol (IP) address. Then, communication from the attacker's host to the target will be discontinued. Consequently, the identified attack activity will stop working, and the service will proceed to run.


2017 ◽  
Vol 7 (1) ◽  
pp. 1
Author(s):  
Xinchu Weng ◽  
Tuo Wang ◽  
Chenxiao Zhang

Baked soybean oil has desired aroma which is loved by most of people. Soybean oil is one of most important vegetable oils consumed in the world. Analysis of aroma components from Baked Soybean Oil extracted by CO2 Supercritical Fluid Extraction (SFE-BSO) was performed by Gas Chromatography-Mass Spectrometry (GC-MS). The aroma components of SFE-BSO were extracted by Simultaneous Distillation Extraction (SDE). Thirty four aroma compounds in SFE-BSO were identified. 3-Methyl-1-butanol and other eleven compounds were the key aroma compounds of SFE-BSO, which were analyzed by GC-Sniffing technique.


1997 ◽  
Vol 45 (7) ◽  
pp. 2630-2637 ◽  
Author(s):  
Philippe Pollien ◽  
Andreas Ott ◽  
Franck Montigon ◽  
Marcel Baumgartner ◽  
Rafael Muñoz-Box ◽  
...  

1993 ◽  
Vol 48 (2) ◽  
pp. 247-248 ◽  
Author(s):  
Gerhard Buchbauer ◽  
Leopold Jirovetz ◽  
Michael Wasicky ◽  
Alexej Nikiforov

AbstractBy headspace analysis of the CO2-extract of shellac 4-methyl-3-penten-2-one (29.57%), 4-hydroxy-4-methyl-2-pentanone (16.66%) and 3-methyl-1-butanol (15.41%) could be identified as main constituents, as well as nearly forty hitherto unknown minor constituents (hydro­carbons, alcohols, aldehydes, ketones, acids and mainly C4-C8-esters). This investigation was car­ried out using GC-FID, GC-FTIR-MS and GC-Sniffing-Technique.


1992 ◽  
Vol 47 (3) ◽  
pp. 439-440 ◽  
Author(s):  
Alexej Nikiforov ◽  
G. Buchbauer ◽  
L. Jirovetz ◽  
B. Remberg ◽  
G. Remberg

Abstract By headspace analysis of the essential oil of Vetiver hitherto sixteen not described volatile constituents, mainly monoterpenes, could be identified. For these investigations GC -FID , GC-MS, GC-FTIR and the GC-sniffing-technique were used.


1988 ◽  
Vol 20 (8-9) ◽  
pp. 1-9 ◽  
Author(s):  
I. H. Suffet ◽  
B. M. Brady ◽  
J. H. M. Bartels ◽  
G. Burlingame ◽  
J. Mallevialle ◽  
...  

The standard methods committee for the 1990 edition of Standard Methods for the Analysis of Water and Wastewater has decided to consider adding a new (provisional) method for the sensory analysis of drinking water - Flavor profile analysis (FPA). A series of issues must be addressed before FPA can become a standard method. The methodology (e.g., temperature of aroma samples, sniffing technique, use of cups vs. flasks, rest intervals between samples, maximum number of samples examined per session) must be standardized. Reference standards for odors must be developed and implemented in order to achieve consistent odor quality descriptions. Development of a flavor wheel can help aid the classification and identification of odors.


Sign in / Sign up

Export Citation Format

Share Document