Technology Corner: Internet Packet Sniffers
نویسندگان
چکیده
Welcome to the Technology Section of the Journal of Digital Forensics, Security, and Law. The goal of this section of the journal is to explore the technical details of the various technologies used in digital forensics, security, and law—or conversely, to explore the technical details of the technologies used by hackers and other digital perpetrators. Since this column was initially proposed by me, I volunteered to start off with the initial article. However, I invite all readers to contribute articles to this section of JDFSL.
منابع مشابه
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information security incidents. To truly understand the contents of the logs and the data packets, examiners need to have a good foundation in the protocols comprising the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. ...
متن کاملA method to increasing the Quality of Service (QoS) in Wireless body area networks by providing a MAC layer Protocol based of Internet of Things
With the development of technology, the use of wireless telecommunication networks for the various affairs is essential. These networks are one of the safest and most widely used networks, for instance, in medical care and remote patient monitoring. What matters is the quality of service in these networks. The purpose of this paper is to increase packet transduction in a wireless body area netw...
متن کاملMAP: A Scalable Measurement Infrastructure for Securing 802.11 Wireless Networks
The shared medium of 802.11 wireless networks means that they are susceptible to many MAC-layer attacks, such as frame spoofing, denial of service, and greedy misbehavior. To detect such attacks it is necessary to monitor the wireless channel itself and examine the timing and content of the 802.11 frames. Wireless “sniffing” is challenging: sniffers may not hear every frame, nearby sniffers may...
متن کاملCenterTrack: An IP Overlay Network for Tracking DoS Floods
Finding the source of forged Internet Protocol (IP) datagrams in a large, high-speed network is difficult due to the design of the IP protocol and the lack of sufficient capability in most high-speed, highcapacity router implementations. Typically, not enough of the routers in such a network are capable of performing the packet forwarding diagnostics required for this. As a result, tracking-dow...
متن کاملPromiscuous Mode Detection Platform
Among various types of attacks on an Ethernet network, “sniffing attack” is probably one of the most difficult attacks to handle. Sniffers are programs that allow a host to capture any packets in an Ethernet network, by putting the host’s Network Interface Card (NIC) into the promiscuous mode. When a host’s NIC is in the normal mode, it captures only the packets sent to the host. Since many bas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JDFSL
دوره 6 شماره
صفحات -
تاریخ انتشار 2011