Packet Sniffing

C Paravathi, D Roshini… - International …, 2024 - ijemr.vandanapublications.com
… any weaknesses in the network. This paper focuses on the use of packet sniffing in various
… By utilizing a packet sniffer, we can capture and analyze network traffic. Different protocols, …

Secure and Efficient data trnsmission using Sniffer for clustered based Wireless Sensor Networks

SC Masaraddi, SI Shirol - … and Management Research (IJEMR), 2015 - indianjournals.com
Sniffer is used to deleteing the attackers and finally the secure and efficient data will be
transmitted in the network represented by graphically.Set-IBS and SetIBOOS protocol have better …

Detection and Countermeasure of Attacks in Virtual Nework System

S Sheerni, SH Brahmananda - … Management Research (IJEMR), 2014 - indianjournals.com
Packet sniffing is the interception of data packets traversing a network. A … Most of
packet sniffers are passive and they listen all data link layer frames passing by the device's …

Network Intrusion Detection Techniques and Open Source Tools

DK Singh, P Kaushik - … and Management Research (IJEMR), 2016 - indianjournals.com
network monitoring for any intrusion attack in either in network segment or device and analyze
the network … of the four modes: Packet sniffing mode, packet logger mode, detection mode …

[PDF][PDF] IJEMR–May 2014-Vol 4 Issue 5-Online-ISSN 2249–2585 Print-ISSN 2249-8672

S Chattopadhyay, AK Ray - ijemr.in
… This requires a well designed and feasible transportation and distribution network,
integrated with the production plan(s); distribution network; pricing policy; national and regional …

Intrusion Detection and Attack Classification Using K Means Algorithm and Artificial Neural Network

A Rana, RR Pandey, S Londhe… - … Research (IJEMR), 2015 - indianjournals.com
… The incoming packets coming in the network are captured in a packet sniffer and are
analyzed. Packet signatures are extracted and these features are discretized using K-means …

Virtual Private Network (VPN) Router using Raspberry-PI

N Shwetha, J Raghu, VG Sahas… - International …, 2023 - ijemr.vandanapublications.com
… The essence of VPN is to build a secure tunnel in the public network using relevant … sniffed.
This research paper provides valuable insights into cost-effective and customizable network

A Study on Detection analysis of Sophisticated Cyber Threats & its Response

SK Deo, PK Mahapatro - … and Management Research (IJEMR), 2016 - indianjournals.com
Detection, analysis, mitigation & response to sophisticated cyber threats explains how we
detect the threats, incidents & disrupting or stealing the information from the system ie said to …

Intelligent Intrusion Detection Categorization using Support Vector and Fuzzy Logic

M Tariq, M Suaib - International Journal of …, 2023 - ijemr.vandanapublications.com
… node will discard every packet, 20% of all packets are taken as the … capture and queuing,
analysis/processing, and reporting modules. The network packets must be read by the capture

[PDF][PDF] Empowering Rural Indian Women through Financial Inclusion-Challenges and Opportunities

M Mathew - 2014 - ijemr.in
… This study attempts to capture the opportunities and challenges faced by them based on …
is to have a combination of physical branch network and BCs for extending financial inclusion, …