Packet Sniffing
C Paravathi, D Roshini… - International …, 2024 - ijemr.vandanapublications.com
… any weaknesses in the network. This paper focuses on the use of packet sniffing in various
… By utilizing a packet sniffer, we can capture and analyze network traffic. Different protocols, …
… By utilizing a packet sniffer, we can capture and analyze network traffic. Different protocols, …
Secure and Efficient data trnsmission using Sniffer for clustered based Wireless Sensor Networks
SC Masaraddi, SI Shirol - … and Management Research (IJEMR), 2015 - indianjournals.com
… Sniffer is used to deleteing the attackers and finally the secure and efficient data will be
transmitted in the network represented by graphically.Set-IBS and SetIBOOS protocol have better …
transmitted in the network represented by graphically.Set-IBS and SetIBOOS protocol have better …
Detection and Countermeasure of Attacks in Virtual Nework System
S Sheerni, SH Brahmananda - … Management Research (IJEMR), 2014 - indianjournals.com
… Packet sniffing is the interception of data packets traversing a network. A … Most of
packet sniffers are passive and they listen all data link layer frames passing by the device's …
packet sniffers are passive and they listen all data link layer frames passing by the device's …
Network Intrusion Detection Techniques and Open Source Tools
… network monitoring for any intrusion attack in either in network segment or device and analyze
the network … of the four modes: Packet sniffing mode, packet logger mode, detection mode …
the network … of the four modes: Packet sniffing mode, packet logger mode, detection mode …
[PDF][PDF] IJEMR–May 2014-Vol 4 Issue 5-Online-ISSN 2249–2585 Print-ISSN 2249-8672
S Chattopadhyay, AK Ray - ijemr.in
… This requires a well designed and feasible transportation and distribution network,
integrated with the production plan(s); distribution network; pricing policy; national and regional …
integrated with the production plan(s); distribution network; pricing policy; national and regional …
Intrusion Detection and Attack Classification Using K Means Algorithm and Artificial Neural Network
A Rana, RR Pandey, S Londhe… - … Research (IJEMR), 2015 - indianjournals.com
… The incoming packets coming in the network are captured in a packet sniffer and are
analyzed. Packet signatures are extracted and these features are discretized using K-means …
analyzed. Packet signatures are extracted and these features are discretized using K-means …
Virtual Private Network (VPN) Router using Raspberry-PI
… The essence of VPN is to build a secure tunnel in the public network using relevant … sniffed.
This research paper provides valuable insights into cost-effective and customizable network …
This research paper provides valuable insights into cost-effective and customizable network …
A Study on Detection analysis of Sophisticated Cyber Threats & its Response
SK Deo, PK Mahapatro - … and Management Research (IJEMR), 2016 - indianjournals.com
Detection, analysis, mitigation & response to sophisticated cyber threats explains how we
detect the threats, incidents & disrupting or stealing the information from the system ie said to …
detect the threats, incidents & disrupting or stealing the information from the system ie said to …
Intelligent Intrusion Detection Categorization using Support Vector and Fuzzy Logic
… node will discard every packet, 20% of all packets are taken as the … capture and queuing,
analysis/processing, and reporting modules. The network packets must be read by the capture …
analysis/processing, and reporting modules. The network packets must be read by the capture …
[PDF][PDF] Empowering Rural Indian Women through Financial Inclusion-Challenges and Opportunities
M Mathew - 2014 - ijemr.in
… This study attempts to capture the opportunities and challenges faced by them based on …
is to have a combination of physical branch network and BCs for extending financial inclusion, …
is to have a combination of physical branch network and BCs for extending financial inclusion, …