Showing 1 - 11 results of 11 for search '"packet sniffing"', query time: 0.25s Refine Results
  1. 1
  2. 2

    Security awareness: A lesson from Tcpdump and Ethereal by Rohani, Mohd. Fo’ad, Maarof, Mohd. Aizaini, Selamat, Ali

    Published 2005
    “…This behavior is vulnerable to packet-sniffing tools, such as sniffit, tcpdump and ethereal. …”
    Get full text
    Conference or Workshop Item
  3. 3

    The Language of Cyberattacks by Phil Cameron

    Published 2020-07-01
    “…A linguistic deconstruction of the techniques of intelligence gathering is discussed, such as packet sniffing, FBI cybercrimes investigations, data collection, remote sensing, storage and retrieval of records. …”
    Get full text
    Article
  4. 4

    ANALISIS LOG SNORT MENGGUNAKAN NETWORK FORENSIC by Ervin Kusuma Dewi

    Published 2017-12-01
    “…Cara kerja Snort mirip dengan TcpDump, tetapi fokus sebagai security packet sniffing. Tujuan dari penelitian ini yaitu menganalisis Log snort sebagai hasil Forensik Jaringan. …”
    Get full text
    Article
  5. 5

    Consortium Blockchain Based Lightweight Message Authentication and Auditing in Smart Home by Bai Liu, Xueyan Yao, Kuikui Guo, Pengda Zhu

    Published 2023-01-01
    “…This topology makes them vulnerable to packet sniffing, spoofing, and other malicious attacks, which can result in the leakage of private data collected by devices. …”
    Get full text
    Article
  6. 6

    An Integrated Testbed for Power System Cyber-Physical Operations Training by Manohar Chamana, Rabindra Bhatta, Konrad Schmitt, Rajendra Shrestha, Stephen Bayne

    Published 2023-08-01
    “…The system’s performance before and after the cyberattacks are studied using packet-sniffing tools and a network packet analyzer. The impact on the grid is analyzed using metrics such as voltage oscillation, frequency deviation, and loss of active power generation. …”
    Get full text
    Article
  7. 7

    Penetration Testing of GSM Network using Man-In-The-Middle Attack by Nosa Bello, Ogechukwu Kanu

    Published 2024-01-01
    “…It can be shown that an attacker can successfully carry out base station spoofing, IMSI catching, GSM packet sniffing, decoding, decryption and Denial of Service (DoS) attacks. …”
    Get full text
    Article
  8. 8

    Remote Industrial Sensor Network Monitoring Using M2M Based Ethical Sniffers by Syed Muhammad Asad Zaidi, Jieun Jung, Minsoo Kang, Byunghun Song, Ki-Hyung Kim

    Published 2012-11-01
    “…We propose a latent network diagnosis system (LaNDS) for industrial sensor networks. LaNDS employs a packet sniffing method for efficiently evaluating network performance and instantly identifying degradation causes of networking performance. …”
    Get full text
    Article
  9. 9

    Self-Organizing Multilateration of an Unknown Number of Transmitters by Kyle W. McClintick, Jeffrey Tolbert, Alexander M. Wyglinski

    Published 2022-01-01
    “…Wireless Sensor Networks (WSNs) that classify the source of detected radio signals require mobile transmitters, physical (PHY) and link layer meta data, and packet sniffing capabilities. These signal classifiers are restricted by assumptions that may be difficult to realize in adversarial Signal of Opportunity (SOP) localization settings, and they do not jointly localize transmitters. …”
    Get full text
    Article
  10. 10

    The Challenge of Only One Flow Problem for Traffic Classification in Identity Obfuscation Environments by Hong-Yen Chen, Tsung-Nan Lin

    Published 2021-01-01
    “…As encrypted traffic grows, network flow classification has become a significant issue because of the impossibility to parse the payload in an encrypted packet. A possible packet sniffing location for organizations is an under control gateway between intranet and internet to inspect network traffic. …”
    Get full text
    Article
  11. 11