An Insight in to Network Traffic Analysis using Packet Sniffer

in the network performance can cause serious concern to network analysts, leading to loss in resources. Such cases are not easy to deal with, due to the lack of time and resources available. Lack of awareness about appropriate tools which detect the attacks or not knowing exactly why a loss in network performance is occurring are some other factors. Connectivity loss or shutting down of terminals within the network for unknown reasons are among the other problems. Mostly, the cause of these problems cannot be detected accurately and is concluded due to poor network architecture, such as inefficiently configured broadcast storms, spanning- tree, usage of unsuitable routing protocols within the network domain, redundant links etc. However, sometimes the cause could be due to attacks by unknown third parties that try to put the web server out-of-service through means of a DoS (Denial of Service) attack, sending traffic with a poisoned ARP in an attempt to discover hosts to infect, or by simply infecting ports with malware to form part of an alien network or botnet. In all these cases, knowing the source of the attack is the first step towards taking appropriate action and achieving correct protection. That is when packet sniffers can be extremely useful to detect, analyze and map traffic. Such packet sniffers identify threats to the network and limit their harmful consequences.

[1]  Ian Graham,et al.  Design principles for accurate passive measurement , 2000 .

[2]  Giuseppe Di Battista,et al.  26 Computer Networks , 2004 .

[3]  Barbara S. Chaparro,et al.  Password Security: What Users Know and What They Actually Do , 2006 .

[4]  Mohamed G. Gouda,et al.  Single Password , Multiple Accounts , 2005 .

[5]  Kenji Takahashi,et al.  Federated identity management for protecting users from ID theft , 2005, DIM '05.

[6]  Xiaohua Yuan,et al.  Application of mini case study in Computer Networks , 2011, 2011 6th International Conference on Computer Science & Education (ICCSE).

[7]  E. Saravanakumar,et al.  Notice of Violation of IEEE Publication PrinciplesSingle password, multiple accounts , 2008, 2008 International Conference on Computing, Communication and Networking.