Applying packet generator for secure network environment

Problem statement: Viruses and hacker attacks typically generate a recognizable pattern or "signature" of packets. Most of Network Traffic Analyzer can identify these packets and alert the administrator to their presence on the network via email or page. Approach: Most traffics analyzers l...

Full description

Saved in:
Bibliographic Details
Main Authors: Abdul Wahid, Mohammed N., Ahmad Zulkarnain, Zuriati
Format: Article
Language:English
Published: Science Publications 2011
Online Access:http://psasir.upm.edu.my/id/eprint/22496/1/Applying%20packet%20generator%20for%20secure%20network%20environment.pdf
http://psasir.upm.edu.my/id/eprint/22496/
http://thescipub.com/abstract/10.3844/jcssp.2011.790.799
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.upm.eprints.22496
record_format eprints
spelling my.upm.eprints.224962015-11-27T06:35:15Z http://psasir.upm.edu.my/id/eprint/22496/ Applying packet generator for secure network environment Abdul Wahid, Mohammed N. Ahmad Zulkarnain, Zuriati Problem statement: Viruses and hacker attacks typically generate a recognizable pattern or "signature" of packets. Most of Network Traffic Analyzer can identify these packets and alert the administrator to their presence on the network via email or page. Approach: Most traffics analyzers let you set alarms to be triggered when a particular pattern is seen. Results: Some network traffic analyzers can be programmed to send an email or page when these conditions are met. Of course; this assumes that the virus and its signature have been seen before and incorporated the analyzer's list of packet filters. ((The packet filters once started the filtering process and also by using packet decode together they can determine the traffic type whether it has normal or abnormal activities. Conclusion/Recommendations: In this study we used Packet Generator to generate a traffic that supposes to act the intruder or hacker signature to prove up that Network Traffic Analysis has the ability to detect like this kind of traffics. And also we have explained in depth about network traffic analysis and its ability to monitor all the network traffics (incoming and outgoing) and view their headers and payload and all other information such as traffic source and destination)). Science Publications 2011 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/22496/1/Applying%20packet%20generator%20for%20secure%20network%20environment.pdf Abdul Wahid, Mohammed N. and Ahmad Zulkarnain, Zuriati (2011) Applying packet generator for secure network environment. Journal of Computer Science, 7 (5). pp. 790-799. ISSN 1549-3636; ESSN: 1552-6607 http://thescipub.com/abstract/10.3844/jcssp.2011.790.799 10.3844/jcssp.2011.790.799
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
language English
description Problem statement: Viruses and hacker attacks typically generate a recognizable pattern or "signature" of packets. Most of Network Traffic Analyzer can identify these packets and alert the administrator to their presence on the network via email or page. Approach: Most traffics analyzers let you set alarms to be triggered when a particular pattern is seen. Results: Some network traffic analyzers can be programmed to send an email or page when these conditions are met. Of course; this assumes that the virus and its signature have been seen before and incorporated the analyzer's list of packet filters. ((The packet filters once started the filtering process and also by using packet decode together they can determine the traffic type whether it has normal or abnormal activities. Conclusion/Recommendations: In this study we used Packet Generator to generate a traffic that supposes to act the intruder or hacker signature to prove up that Network Traffic Analysis has the ability to detect like this kind of traffics. And also we have explained in depth about network traffic analysis and its ability to monitor all the network traffics (incoming and outgoing) and view their headers and payload and all other information such as traffic source and destination)).
format Article
author Abdul Wahid, Mohammed N.
Ahmad Zulkarnain, Zuriati
spellingShingle Abdul Wahid, Mohammed N.
Ahmad Zulkarnain, Zuriati
Applying packet generator for secure network environment
author_facet Abdul Wahid, Mohammed N.
Ahmad Zulkarnain, Zuriati
author_sort Abdul Wahid, Mohammed N.
title Applying packet generator for secure network environment
title_short Applying packet generator for secure network environment
title_full Applying packet generator for secure network environment
title_fullStr Applying packet generator for secure network environment
title_full_unstemmed Applying packet generator for secure network environment
title_sort applying packet generator for secure network environment
publisher Science Publications
publishDate 2011
url http://psasir.upm.edu.my/id/eprint/22496/1/Applying%20packet%20generator%20for%20secure%20network%20environment.pdf
http://psasir.upm.edu.my/id/eprint/22496/
http://thescipub.com/abstract/10.3844/jcssp.2011.790.799
_version_ 1643827843143041024
score 13.211869