

Analyzing Real-Time Network Traffic Through Packet Sniffing: A Wireshark-Based Case Study
Abstract
References
Combs, G. (2023). Wireshark User Guide. Retrieved from Wireshark remains one of the most accessible yet powerful tools for network traffic analysis. This study illustrated its effectiveness in capturing detailed insights into network behavior, diagnosing faults, and detecting potential security threats.
By employing a structured approach, network administrators and cybersecurity professionals can harness Wireshark for ongoing monitoring and forensic investigation.
Future research could explore:Integration of Wireshark with automated anomaly detection systems using machine learning Development of real-time dashboards for visualization.
Use of Wireshark in cloud-native environments and IoT networks.
Ultimately, responsible and informed use of packet sniffing tools is essential in maintaining the integrity, security, and performance of today’s complex network systems.
Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication.
Kurose, J.F., & Ross, K.W. (2021). Computer Networking: A Top-Down Approach. 8th Edition, Pearson.
Bejtlich, R. (2013). The Practice of Network Security Monitoring: Understanding Incident Detection and Response. No Starch Press. SANS Institute. (2022).
Ethical Guidelines for Network Monitoring. Wireshark remains one of the most accessible yet powerful tools for network traffic analysis. This study illustrated its effectiveness in capturing detailed insights into network behavior, diagnosing faults, and detecting potential security threats.By employing a structured approach, network administrators and cybersecurity professionals can harness Wireshark for ongoing monitoring and forensic investigation.
Future research could explore:Integration of Wireshark with automated anomaly detection systems using machine learning.
Refbacks
- There are currently no refbacks.