Graphical analysis of captured network packets for detection of suspicious network nodes

被引:1
|
作者
Aryeh, Felix Larbi [1 ]
Alese, Boniface Kayode [2 ]
Olasehinde, Olayemi [3 ]
机构
[1] Univ Mines & Technol, Comp Sci & Eng Dept, Tarkwa, Ghana
[2] Fed Univ Technol Akure, Dept Cybersecuriry, Akure, Nigeria
[3] Fed Polytech, Dept Comp Sci, Ile Oluji, Ondo State, Nigeria
关键词
Internet Control Message Protocol (ICMP); Packet Capture (PCAP); User Datagram Protocol; (UDP)Transmission Control Protocol (TCP);
D O I
10.1109/cybersa49311.2020.9139672
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of the Internet has yielded the rapid development of Information Technology related applications over the past two decades. Most organizations have adopted the use of a computer network to make accessibility and sharing of network applications and devices possible. However, currently, network security has been one of the critical things most organization and corporation has to handle. Each day, attacks are continually being executed into professional secured corporate or organization networks and sometimes into private networks. Wireshark is a tool generally used for network packet capture however, it is very tedious sometimes to filter and follow TCP streams. This problem exacerbates in a situation where colossal network data or traffic needs to be analyzed for suspicious traffic. This paper leverages the use of Python libraries and Data Science techniques to ease the packet capturing and graphical analysis process on a live network. Using these techniques will enhance the gleaning out more interesting attributes of network packet and fish out the suspicious IP address, network ports or malicious data readily within the shortest possible time. The research conducted showed how a broadcast IP address 255.255.255.255 might be suspicious within the internal network of the live university network. The suspicion was based on the payload data sent to this address and a possible error or misconfiguration on the Ubiquiti UniFi access point.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Using Artificial Packets for Training Network Payload Anomaly Detection Systems
    Karuppanchetty, Chockalingam
    Edmonds, William
    Kim, Sun-il
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 923 - 928
  • [32] A NOVEL DETECTION OF NETWORK ERRORS BY STUDY OF RAW TCP/IP PACKETS
    Ravindran, M.
    Bhaskaran, R.
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT, VOL 1, 2009, : 372 - +
  • [33] Performance of Various Algorithms to Reduce the Number of Transmitted Packets by Sensor Nodes in Wireless Sensor Network
    Husni, M., I
    Hussein, M. K.
    Alduais, N. A. M.
    Abdullah, Jiwa
    Marghescu, Ion
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI-2019), 2019,
  • [34] Analysis of the Dynamic Influence of Social Network Nodes
    Yin, Hong-Jian
    Yu, Hai
    Zhao, Yu-Li
    Zhu, Zhi-Liang
    Zhang, Wei
    SCIENTIFIC PROGRAMMING, 2017, 2017
  • [35] Fault Tolerance Analysis of Autonomous Network Nodes
    Shakhov, V.
    Sokolova, O.
    2014 12TH INTERNATIONAL CONFERENCE ON ACTUAL PROBLEMS OF ELECTRONICS INSTRUMENT ENGINEERING (APEIE), 2014, : 648 - 650
  • [36] Reliability analysis and congestion control on network nodes
    Shi Jian
    Wang Shaoping
    2006 IEEE CONFERENCE ON ROBOTICS, AUTOMATION AND MECHATRONICS, VOLS 1 AND 2, 2006, : 296 - +
  • [37] Data Analysis of Bitcoin Blockchain Network Nodes
    Jiang Xiaomeng
    Zhang Fan
    Lin Shenwen
    Yang Jinglin
    He Ketai
    PROCEEDINGS OF THE 15TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2020), 2020, : 1891 - 1895
  • [38] Analysis of weakly correlated nodes in market network
    Semenov, Dmitry
    Koldanov, Alexander
    Koldanov, Petr
    COMPUTATIONAL MANAGEMENT SCIENCE, 2024, 21 (01)
  • [39] Forensic Analysis of Network Packets from Penetration Test Toolkits
    Kao, Da-Yu
    Wang, Yu-Siang
    Tsai, Fu-Ching
    Chen, Chien-Hung
    2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 363 - 368
  • [40] Network Performance Analysis Using Packets Probe for Passive Monitoring
    Alkenani J.
    Nassar K.A.
    Informatica (Slovenia), 2022, 46 (07): : 153 - 160