Graphical analysis of captured network packets for detection of suspicious network nodes

被引:1
|
作者
Aryeh, Felix Larbi [1 ]
Alese, Boniface Kayode [2 ]
Olasehinde, Olayemi [3 ]
机构
[1] Univ Mines & Technol, Comp Sci & Eng Dept, Tarkwa, Ghana
[2] Fed Univ Technol Akure, Dept Cybersecuriry, Akure, Nigeria
[3] Fed Polytech, Dept Comp Sci, Ile Oluji, Ondo State, Nigeria
关键词
Internet Control Message Protocol (ICMP); Packet Capture (PCAP); User Datagram Protocol; (UDP)Transmission Control Protocol (TCP);
D O I
10.1109/cybersa49311.2020.9139672
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of the Internet has yielded the rapid development of Information Technology related applications over the past two decades. Most organizations have adopted the use of a computer network to make accessibility and sharing of network applications and devices possible. However, currently, network security has been one of the critical things most organization and corporation has to handle. Each day, attacks are continually being executed into professional secured corporate or organization networks and sometimes into private networks. Wireshark is a tool generally used for network packet capture however, it is very tedious sometimes to filter and follow TCP streams. This problem exacerbates in a situation where colossal network data or traffic needs to be analyzed for suspicious traffic. This paper leverages the use of Python libraries and Data Science techniques to ease the packet capturing and graphical analysis process on a live network. Using these techniques will enhance the gleaning out more interesting attributes of network packet and fish out the suspicious IP address, network ports or malicious data readily within the shortest possible time. The research conducted showed how a broadcast IP address 255.255.255.255 might be suspicious within the internal network of the live university network. The suspicion was based on the payload data sent to this address and a possible error or misconfiguration on the Ubiquiti UniFi access point.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] The Impact of the Neural Network Structure by the Detection of Undesirable Network Packets
    Halenar, I.
    Libosvarova, A.
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2012, VOL II, 2012, : 914 - 918
  • [2] Using Object Detection Network for Malware Detection and Identification in Network Traffic Packets
    Du, Chunlai
    Liu, Shenghui
    Si, Lei
    Guo, Yanhui
    Jin, Tong
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (03): : 1785 - 1796
  • [3] A graphical programming approach to wireless sensor network nodes
    Ghercioiu, Marius
    Proceedings of the ISA/IEEE 2005 Sensors for Industry Conference, 2005, : 118 - 121
  • [4] An Approach for Scale Suspicious Network Events Detection
    Dong, Cong
    Chen, YuFan
    Zhang, YunJian
    Jiang, Bo
    Han, DongXu
    Liu, BaoXu
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5854 - 5863
  • [5] PROTECTING PACKETS AGAINST MALICIOUS NODES IN MOBILE AD HOC NETWORK
    Devi
    Jayakumar
    IIOAB JOURNAL, 2016, 7 (09) : 64 - 68
  • [6] Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic
    Department of Computer Sciences, City University of Science and Information Technology, Peshawar, Pakistan
    不详
    Int. J. Comput. Sci. Issues, 1600, 2 (259-265):
  • [7] Suspicious Customer Detection on the Blockchain Network for Cryptocurrency Exchanges
    Jiang, Haiou
    Zhang, Keming
    Ma, Xinjian
    Sun, Yanchun
    Ma, Yun
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2022, 2022, 1679 : 265 - 277
  • [8] Reading Network Packets as a Natural Language for Intrusion Detection
    Mimura, Mamoru
    Tanaka, Hidema
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 339 - 350
  • [9] Fusion of wavelet packets and neural network in detection of composites
    Wu, YJ
    Shi, XZ
    Zhuang, TG
    AIAA JOURNAL, 2000, 38 (06) : 1063 - 1069
  • [10] Convolutional Neural Network for Vehicle Detection in A Captured Image
    Abrougui, Alia
    Hayouni, Mohamed
    2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2022, : 1166 - 1171