Technology Corner: Internet Packet Sniffers

نویسندگان

  • Nick V. Flor
  • Kenneth Guillory
چکیده

Welcome to the Technology Section of the Journal of Digital Forensics, Security, and Law. The goal of this section of the journal is to explore the technical details of the various technologies used in digital forensics, security, and law—or conversely, to explore the technical details of the technologies used by hackers and other digital perpetrators. Since this column was initially proposed by me, I volunteered to start off with the initial article. However, I invite all readers to contribute articles to this section of JDFSL.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners

Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information security incidents. To truly understand the contents of the logs and the data packets, examiners need to have a good foundation in the protocols comprising the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. ...

متن کامل

A method to increasing the Quality of Service (QoS) in Wireless body area networks by providing a MAC layer Protocol based of Internet of Things

With the development of technology, the use of wireless telecommunication networks for the various affairs is essential. These networks are one of the safest and most widely used networks, for instance, in medical care and remote patient monitoring. What matters is the quality of service in these networks. The purpose of this paper is to increase packet transduction in a wireless body area netw...

متن کامل

MAP: A Scalable Measurement Infrastructure for Securing 802.11 Wireless Networks

The shared medium of 802.11 wireless networks means that they are susceptible to many MAC-layer attacks, such as frame spoofing, denial of service, and greedy misbehavior. To detect such attacks it is necessary to monitor the wireless channel itself and examine the timing and content of the 802.11 frames. Wireless “sniffing” is challenging: sniffers may not hear every frame, nearby sniffers may...

متن کامل

CenterTrack: An IP Overlay Network for Tracking DoS Floods

Finding the source of forged Internet Protocol (IP) datagrams in a large, high-speed network is difficult due to the design of the IP protocol and the lack of sufficient capability in most high-speed, highcapacity router implementations. Typically, not enough of the routers in such a network are capable of performing the packet forwarding diagnostics required for this. As a result, tracking-dow...

متن کامل

Promiscuous Mode Detection Platform

Among various types of attacks on an Ethernet network, “sniffing attack” is probably one of the most difficult attacks to handle. Sniffers are programs that allow a host to capture any packets in an Ethernet network, by putting the host’s Network Interface Card (NIC) into the promiscuous mode. When a host’s NIC is in the normal mode, it captures only the packets sent to the host. Since many bas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JDFSL

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2011