Method To Monitor The Transfer of Packets: Packet Sniffer: Abstract
Method To Monitor The Transfer of Packets: Packet Sniffer: Abstract
Method To Monitor The Transfer of Packets: Packet Sniffer: Abstract
Disadvantage:
Packet sniffers may also peep into the data being transferred in/over a network.
3. Anti-sniffer tools— use these tools to employ software and hardware designed to detect the
use of sniffers on a network.
4. Cryptography— the most effective method for countering packet sniffers does not prevent
or detect packet sniffers, but rather renders them irrelevant.
Objective:
The main objective of a packet sniffer (a device or a program) is to trace out all the incoming
and outgoing packets in a network, be it in a Shared Ethernet or in a Switched Ethernet.
The packet sniffer will capture data that is addressed to other machines, saving it for later
analysis.
Existing System:
The existing system also traces the “transfer”, but can provide only less information
regarding the protocols, layers and the memory. It may not be able to give you an idea about
the used and the unused or the free memory in complete detail.
Proposed System:
The proposed system is able to provide the information of packets, memory, 12protocols and
3layers (network, transport and application), as these are considered the most required or the
essential ones.
It also illustrates and represents them in different graphical/pictorial forms as in tree graphs,
pie-charts etc.
Problem Definition:
A packet sniffer is a tool that plugs into a computer network and monitors all network traffic
and monitors traffic destined to itself as well as to all other hosts on the network and also
shows the memory status of the system.
Problem Scope:
Since a packet sniffer is used to trace out the packets transfer over a network, the network
administrator, who works with that tool, can have an idea of the network traffic and can work
accordingly. Without having an absolute or a proper idea the administrator may even face
problems in managing the traffic which may also give rise to small-severe problems.
The following can be told as some of the reasons or trends that affect security.
4. Lack of awareness
All the information that travels across a network is sent in "packets." For example, when an
email is sent from one computer to another, it is first broken up into smaller segments. Each
segment has the destination address attached, the source address, and other information such
as the number of packets and reassembly order. Once they arrive at the destination, the
packet's headers and footers are stripped away, and the packets reconstituted.
A packet sniffer gives meta-data and sometimes it may also be used in a wrong manner.