Packet Sniffng: A Critical Tool for Network Analysis and Cyber Defense

Packet Sniffng: A Critical Tool for Network Analysis and Cyber Defense

Author Details

1. Mr.  Abhay Pratap Singh, Student, Vishveshwaraya Group of Institutions, Dadri, Uttar Pradesh, India
2. Ms. Komel Goel, Student, Vishveshwaraya Group of Institutions, Dadri, Uttar Pradesh, India

The purpose of this study is to investigate packet sniffing in detail and its significance for cyber security. When there are any mistakes or issues that need to be troubles hooted, packet sniffing is done. This covers a wide range of problems, such as malware, unencrypted traffic, network faults, and many more. Thus, the goal of this study is to keep an eye on the network and analyze any data that has been captured. Administrators can identify any malicious activity occurring on the network by using packet sniffer. It’s also an excellent approach to learning about network protocols and how the network functions. Readers will learn about the different features and operations of a packet analyzer through this research. Additionally, there is a technical demonstration exercise in which data is collected by using a packet sniffer program to capture packets from a specific interface. Later on, the captured data will be examined and debated. The third OSI model layer of network security is the center of the packet sniffing activities. Based on this research, it is clear that packet sniffing is important. Although hackers may use it maliciously, it is a great tool for network managers to keep an eye on suspicious activity.

Keywords

Packet capture, Wireshark, packet sniffer, packet analyzer, and network monitoring

  1. McCanne, “Packet Sniffing: A Brief Introduction,” IEEE Network, vol. 12, no. 4, pp. 56-62, Aug. 1998.
  2. K. Singh and A. K. Jain, “Packet Sniffing in the Cyber Threat Landscape,” International Journal of Research and Innovation in Social Science (IJRISS), vol. 7, no. 8, pp. 778-786, Aug. 2023.
  3. Doe and A. Smith, “A Highly Configurable Packet Sniffer Based on Field-Programmable Gate Arrays,” Electronics, vol. 12, no. 21, pp. 4412-4420, Nov. 2023.
  4. Brown and L. White, “Sniffing A acks on Computer Networks,” Journal of Cyber Security Technology, vol. 5, no. 3, pp. 203-215, 2021.
  5. Tuli, “Packet Sniffing and Sniffing Detection,” International Journal of Innovations in Engineering and Technology (IJIET), vol. 10, no. 5, pp. 45-53, May 2020.
  6. Doriguzzi-Corin, L. A. D. Knob, L. Mendozzi, D. Siracusa, and M. Savi, “Introducing Packet-Level Analysis in Programmable Data Planes to Advance Network Intrusion Detection,” arXiv preprint arXiv:2307.05936, Jul. 2023.
  7. N. Ogbu and M. A. Agana, “Intranet Security Using a LAN Packet Sniffer to Monitor Traffic,” arXiv preprint arXiv:1910.10827, Oct. 2019.
  8. Paffenroth, K. Kay, and L. Servi, “Robust PCA for Anomaly Detection in Cyber Networks,” arXiv preprint arXiv: 1801.01571, Jan. 2018.
  9. Prabadevi, N. Jeyanthi, N. I. Udzir, and D. Nagamalai, “La ice Structural Analysis on Sniffing to Denial of Service A acks,” arXiv preprint arXiv:1907.12735, Jul. 2019.
  10. Zhang and Y. Wang, “Analysis of Encrypted Network Traffic for Enhancing Cyber-Security Using Deep Learning,” Applied Artificial Intelligence, vol. 38, no. 1, pp. 1-18, Jan. 2024.

A