ARCHIVES
Research Article
Automated Comprehensive Port and Traffic Analysis
A. Richard William1
Pooja C2
Nandhini M3
Neelavathi C4
Promodini S5
1Assistant Professor, Department of Information Technology, Er. Perumal Manimekalai College of Engineering, Hosur, Tamilnadu, India. 2345 Department of Information Technology, Er. Perumal Manimekalai College of Engineering, Hosur, Tamilnadu, India.
Published Online: May-August 2024
Pages: 131-135
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20240302019References
1. Takahashi, D., Xiao, Y. and Meng, K. (2011) „Virtual flow-net for accountability and forensics of computer and network systems‟, (Wiley
Journal of) Security and Communication Networks, Vol. 7, No. 12, December, pp.2509–2526.
2. Denis Makrushin” Indicators of Compromise as an Instrument for Threat Intelligence”
https://www.researchgate.net/publication/349211330, Published in august 2015.
3. Thor, J. (2009) Why You Need a Network Analyzer, online available http://www.technewsworld.com/story/67411.html
4. Meng, K., Xiao, Y. and Vrbsky, “Building a wireless capturing tool for WiF”, Wiley Journal of Security and Communication Networks, Vol.
2, No. 6, November–December S.V. (2009), pp.654–668.
5. Vivens Ndatinya, Zhifeng Xiao, Vasudeva Rao Manepalli, Ke Meng and Yang Xiao “Network forensics analysis using Wireshark” Article in
International Journal of Security and Networks • Vol. 10, No. 2, 2015.
6. Chris Sanders “Practical Packet Analysis Using Wireshark to solve Real-World Network Problems” 2nd Edition
7. https://www.malware-traffic-analysis.net/training- exercises.html 2020-08-21 -- Traffic analysis exercise
8. Jack G Zheng, Svetlana Peltsverger “Web Analytics Overview” In book: Encyclopedia of Information Science and Technology, Third Edition
Chapter: 756 Publisher: IGI Global January 2015
9. https://en.wikipedia.org/wiki/VirusTotal.
10. Richard Sharpe, Ed Warnicke, Ulf Lamping” Wireshark User‟s Guide Version” 3.7.0 available online at
11. https://www.wireshark.org/docs/wsug_html/. Allied Telesis “Dynamic Host Configuration Protocol.
Journal of) Security and Communication Networks, Vol. 7, No. 12, December, pp.2509–2526.
2. Denis Makrushin” Indicators of Compromise as an Instrument for Threat Intelligence”
https://www.researchgate.net/publication/349211330, Published in august 2015.
3. Thor, J. (2009) Why You Need a Network Analyzer, online available http://www.technewsworld.com/story/67411.html
4. Meng, K., Xiao, Y. and Vrbsky, “Building a wireless capturing tool for WiF”, Wiley Journal of Security and Communication Networks, Vol.
2, No. 6, November–December S.V. (2009), pp.654–668.
5. Vivens Ndatinya, Zhifeng Xiao, Vasudeva Rao Manepalli, Ke Meng and Yang Xiao “Network forensics analysis using Wireshark” Article in
International Journal of Security and Networks • Vol. 10, No. 2, 2015.
6. Chris Sanders “Practical Packet Analysis Using Wireshark to solve Real-World Network Problems” 2nd Edition
7. https://www.malware-traffic-analysis.net/training- exercises.html 2020-08-21 -- Traffic analysis exercise
8. Jack G Zheng, Svetlana Peltsverger “Web Analytics Overview” In book: Encyclopedia of Information Science and Technology, Third Edition
Chapter: 756 Publisher: IGI Global January 2015
9. https://en.wikipedia.org/wiki/VirusTotal.
10. Richard Sharpe, Ed Warnicke, Ulf Lamping” Wireshark User‟s Guide Version” 3.7.0 available online at
11. https://www.wireshark.org/docs/wsug_html/. Allied Telesis “Dynamic Host Configuration Protocol.
Related Articles
2024
Revolutionizing User Interfaces: Exploring the Latest Trends in Front-End Development
2024
Website Development in Computer Science: Unveiling the Digital World
2024
Review on RSA Cryptography, Steganography and Compression Techniques for Data Security
2024
Stock Price Prediction Using LSTM
2024
Comparative Analysis of Program Execution Time Required by Python, R and Julia Compiler
2024