ARCHIVES

Research Article

Automated Comprehensive Port and Traffic Analysis

A. Richard William1 Pooja C2 Nandhini M3 Neelavathi C4 Promodini S5
1Assistant Professor, Department of Information Technology, Er. Perumal Manimekalai College of Engineering, Hosur, Tamilnadu, India. 2345 Department of Information Technology, Er. Perumal Manimekalai College of Engineering, Hosur, Tamilnadu, India.

Published Online: May-August 2024

Pages: 131-135

References

1. Takahashi, D., Xiao, Y. and Meng, K. (2011) „Virtual flow-net for accountability and forensics of computer and network systems‟, (Wiley
Journal of) Security and Communication Networks, Vol. 7, No. 12, December, pp.2509–2526.
2. Denis Makrushin” Indicators of Compromise as an Instrument for Threat Intelligence”
https://www.researchgate.net/publication/349211330, Published in august 2015.
3. Thor, J. (2009) Why You Need a Network Analyzer, online available http://www.technewsworld.com/story/67411.html
4. Meng, K., Xiao, Y. and Vrbsky, “Building a wireless capturing tool for WiF”, Wiley Journal of Security and Communication Networks, Vol.
2, No. 6, November–December S.V. (2009), pp.654–668.
5. Vivens Ndatinya, Zhifeng Xiao, Vasudeva Rao Manepalli, Ke Meng and Yang Xiao “Network forensics analysis using Wireshark” Article in
International Journal of Security and Networks • Vol. 10, No. 2, 2015.
6. Chris Sanders “Practical Packet Analysis Using Wireshark to solve Real-World Network Problems” 2nd Edition
7. https://www.malware-traffic-analysis.net/training- exercises.html 2020-08-21 -- Traffic analysis exercise
8. Jack G Zheng, Svetlana Peltsverger “Web Analytics Overview” In book: Encyclopedia of Information Science and Technology, Third Edition
Chapter: 756 Publisher: IGI Global January 2015
9. https://en.wikipedia.org/wiki/VirusTotal.
10. Richard Sharpe, Ed Warnicke, Ulf Lamping” Wireshark User‟s Guide Version” 3.7.0 available online at
11. https://www.wireshark.org/docs/wsug_html/. Allied Telesis “Dynamic Host Configuration Protocol.

Related Articles

2024

Revolutionizing User Interfaces: Exploring the Latest Trends in Front-End Development

2024

Website Development in Computer Science: Unveiling the Digital World

2024

Review on RSA Cryptography, Steganography and Compression Techniques for Data Security

2024

Stock Price Prediction Using LSTM

2024

Comparative Analysis of Program Execution Time Required by Python, R and Julia Compiler

2024

Online Auction App

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20240302019

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.