International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 94 - Number 11 |
Year of Publication: 2014 |
Authors: Jhilam Biswas, Ashutosh |
10.5120/16391-5975 |
Jhilam Biswas, Ashutosh . An Insight in to Network Traffic Analysis using Packet Sniffer. International Journal of Computer Applications. 94, 11 ( May 2014), 39-44. DOI=10.5120/16391-5975
Slowdown in the network performance can cause serious concern to network analysts, leading to loss in resources. Such cases are not easy to deal with, due to the lack of time and resources available. Lack of awareness about appropriate tools which detect the attacks or not knowing exactly why a loss in network performance is occurring are some other factors. Connectivity loss or shutting down of terminals within the network for unknown reasons are among the other problems. Mostly, the cause of these problems cannot be detected accurately and is concluded due to poor network architecture, such as inefficiently configured broadcast storms, spanning-tree, usage of unsuitable routing protocols within the network domain, redundant links etc. However, sometimes the cause could be due to attacks by unknown third parties that try to put the web server out-of-service through means of a DoS (Denial of Service) attack, sending traffic with a poisoned ARP in an attempt to discover hosts to infect, or by simply infecting ports with malware to form part of an alien network or botnet. In all these cases, knowing the source of the attack is the first step towards taking appropriate action and achieving correct protection. That is when packet sniffers can be extremely useful to detect, analyze and map traffic. Such packet sniffers identify threats to the network and limit their harmful consequences.