Intranet Security using a LAN Packet Sniffer to Monitor Traffic

10/23/2019
by   Henry N. Ogbu, et al.
0

This paper was designed to provide Intranet traffic monitoring by sniffing the packets at the local Area Network (LAN) server end to provide security and control. It was implemented using five computer systems configured with static Internet Protocol (IP) addresses used in monitoring the IP traffic on the network by capturing and analyzing live packets from various sources and destinations in the network. The LAN was deployed on windows 8 with a D-link 16-port switch, category 6 Ethernet cable and other LAN devices. The IP traffics were captured and analyzed using Wireshark Version 2.0.3. Four network instructions were used in the analysis of the IP traffic and the results displayed the IP and Media Access Control (MAC) address sources and destinations of the frames, Ethernet, IP addresses, User Datagram Protocol (UDP) and Hypertext Transfer Protocol (HTTP). The outcome can aid network administrators to control Intranet access and provide security.

READ FULL TEXT

page 8

page 10

research
08/19/2021

Network Security Modeling using NetFlow Data: Detecting Botnet attacks in IP Traffic

Cybersecurity, security monitoring of malicious events in IP traffic, is...
research
09/14/2023

Visualizing MAC and IPv6 Address Allocations

In this work, I describe a method for visualizing two types of network a...
research
05/06/2020

An Overview of Self-Similar Traffic: Its Implications in the Network Design

The knowledge about the true nature of the traffic in computer networkin...
research
06/23/2021

Advancing Protocol Diversity in Network Security Monitoring

With information technology entering new fields and levels of deployment...
research
06/23/2018

A readout method based on 10 Gigabit Ethernet for Sipixel detector

With the rapid development of network protocol, TCP/IP has been widely a...
research
02/07/2023

Analyzing Network performance parameters using wireshark

Network performance can be a prime concern for network administrators. T...
research
11/24/2022

Network Security Modelling with Distributional Data

We investigate the detection of botnet command and control (C2) hosts in...

Please sign up or login with your details

Forgot password? Click here to reset