CFP last date
20 January 2025
Reseach Article

Article:Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection

by Usha Banerjee, Ashutosh Vashishtha, Mukul Saxena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 7
Year of Publication: 2010
Authors: Usha Banerjee, Ashutosh Vashishtha, Mukul Saxena
10.5120/1092-1427

Usha Banerjee, Ashutosh Vashishtha, Mukul Saxena . Article:Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection. International Journal of Computer Applications. 6, 7 ( September 2010), 1-5. DOI=10.5120/1092-1427

@article{ 10.5120/1092-1427,
author = { Usha Banerjee, Ashutosh Vashishtha, Mukul Saxena },
title = { Article:Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection },
journal = { International Journal of Computer Applications },
issue_date = { September 2010 },
volume = { 6 },
number = { 7 },
month = { September },
year = { 2010 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume6/number7/1092-1427/ },
doi = { 10.5120/1092-1427 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:54:45.726990+05:30
%A Usha Banerjee
%A Ashutosh Vashishtha
%A Mukul Saxena
%T Article:Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 6
%N 7
%P 1-5
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper illustrates the functionality of Wireshark as a sniffing tool in networks. This has been proven by an experimental setup which depicts the efficiency of detection of a malicious packet in any network. Testing has been achieved through experimentation on a real time network analyzed by Wireshark. Inferences have been made which clearly depict Wireshark’s capabilities highlighting it as a strong candidate for future development into a robust intrusion detection system. This paper highlights the working of Wireshark as a network protocol analyzer and also accentuates its flexibility as an open source utility to allow developers to add possible functionalities of intrusion detection devices in it.

References
  1. Roesch M (1999) Snort - Lightweight Intrusion Detection for Networks. In Proceedings of Thirteenth Systems Administration Conference (LISA), pp 229-238.
  2. Stolze M, Pawlitzek R and Hild S (2003a) Task Support for Network Security Monitoring. In ACM CHI Workshop on System Administrators Are Users, Too: Designing Workspaces for Managing Internet-Scale Systems.
  3. Lee W, Stolfo SJ and Mok KW (2000) Adaptive Intrusion Detection: A Data Mining Approach. Artificial Intelligence Review 14(6), 533-567.
  4. Stolze M, Pawlitzek R and Wespi A (2003b) Visual Problem-Solving Support for New Event Triage in Centralized Network Security Monitoring: Challenges, Tools and Benefits. In GI-SIDAR conference IT-Incident Management and IT-Forensics (IMF).
  5. Pinkas, B., Sander, T.: Securing passwords against dictionary attacks Proceedings of the 9th ACM conference on Computer and communications security Washington, DC, USA (2002 ) 161-170
  6. Madsen, P., Koga, Y., Takahashi, K.: Federated identity management for protecting users from ID theft Proceedings of the 2005 workshop on Digital identity management Fairfax, VA, USA (2005) 77-83
  7. Gouda, M.G., Liu, A.X., Leung, L.M., Alam, M.A.: Single Password, Multiple Accounts. Proceedings of 3rd Applied Cryptography and Network Security Conference (industry track), New York City, New York (2005)
  8. Luo, H., Henry, P.: A common password method for protection of multiple accounts. 14th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Vol. 3 (2003) 2749 - 2754
  9. Gaw, S., Felten, E.W.: Password management strategies for online accounts. Proceedings of the second symposium on Usable privacy and security ACM Press, Pittsburgh, Pennsylvania (2006) 44-55
  10. Riley, S.: Password Security: What Users Know and What They Actually Do. Usability News, Vol. 2006. Software Usability Research Laboratory, Department of Psychology, Wichita State University, Wichita (2006)
  11. S. R. Snapp, J. Brentano, G. V. Dias, T. L. Goan, L. T. Heberlein, C. Ho, K. N. Levitt, B. Mukherjee, S. E. Smaha, T. Grance, D. M. Teal and D. Mansur, DIDS (Distributed Intrusion Detection System) Motivation, Architecture and Early Prototype, Proceeding 14th National Computer Security Conference, pg. 167 176, 1991
  12. S. James P. Anderson, Computer security threat monitoring and surveillance” ,Technical report, Fort Washington, PA, April 1980
  13. Stephen E. Smaha, ”Haystack: An intrusion detection system”, In Proceedings of the Fourth Aerospace Computer Security Applications Conference, pages 37-44, December 1988.
  14. L. Todd Heberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood, and David Wolber, ”A network security monitor”, In Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pages 296-304, May 1990.
Index Terms

Computer Science
Information Sciences

Keywords

Data Intrusion Detection Sniffing WireShark