Packet Analysis for Cyber Attack Detection
Abstract
Real-time network data collection is crucial for identifying security risks such as outdated software and open ports. Network forensics uses packet analysis to monitor traffic, detect threats, trace intrusions, and recover digital content. This study evaluates the integrity of home networks using Wireshark, capturing traffic across devices. Wireshark provides both basic statistics and advanced tools for analyzing network performance.
References
Sikos, "Packet Analysis for Network Forensics: A Comprehensive Survey," Forensic Science International: Digital Investigation, vol. 32, p. 200892, 2020. DOI:10.1016/j.fsidi.2019.200892.
Alfawareh, "A Deeper Look into Network Traffic Analysis using Wireshark," Academia.Edu, vol. 1, pp. 4–7. Available Online.
Tuli, "Analyzing Network Performance Parameters using Wireshark," International Journal of Network Security and Its Applications, vol. 15, no. 01, pp. 01–13, 2023. DOI: 10.5121/ijnsa.2023.15101.
M., S. A., A. S., and R. K., "Exploring Wireshark for Network Traffic Analysis," International Journal of Multidisciplinary Research, vol. 5, no.6, pp. 1–12, 2023. DOI:10.36948/ijfmr.2023.v05i06.8876.
Saxena and S. Kumar Sharma, "Analysis of Network Traffic using Packet Sniffing Tool: Wireshark," International Journal of Advanced Research, vol. 3, no. 6, pp. 804–808, 2017. Available Online. Kaur, "Investigating Network Traffic using Packet Sniffing Tool Wireshark," Journal of Emerging Technologies and Innovative Research, vol. 6, no. 1, pp. 181–186, 2019. Available Online.
Shandilya, C. Ganguli, I. Izonin, and P. A. K. Nagar, "Cyber Attack Evaluation Dataset for Deep Packet Inspection and Analysis," Data in Brief, vol. 46, p. 108771, 2023. DOI:10.1016/j.dib.2022.108771.
Refbacks
- There are currently no refbacks.