Digital Forensics: Analyze and Monitor Network Traffic Using Sniffer (Application Software)

Abstract

Digital forensic is the process of interpreting and uncovering electronic data. The goal of process is to preserve any evidence in its most original form while applying performing a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events. This dissertation will discuss the need for network forensics to be practiced in legal and an effective way. In this study also confer types of digital forensics and also prevention ideas from online fraud, social networking crime etc. IDS stand for intrusion detection system is a technique by using of we can monitor our network traffic and also take control over suspicious activity and alter the administrator or the network. In this dissertation I also try to define how computer may communicate with each other as well as how they share resources and using same internet. This paper defined types of intrusion detection system and did practical implementation on packet transmission in order to sniff bad data packets and take control over transmission between computers which share resources. The full implementation of the sniffer application software that captures network data as well as provides sufficient means for the decision making process of an administrator. The aim of this application is to rewrite C# language sniffer into .Net, and also develop an application that consumes little memory on the hard disk.

Authors and Affiliations

Neeraj . , Sonal Beniwal

Keywords

Related Articles

An Ensemble Model for Teaching Assistant Evaluation using Classification Technique.

Teaching Assistant Evaluation is very important for every education sector for academic improvement. To improve the performance of teaching skill, criteria is increasing day by day. Due large number of data and criteria...

Fault Detection and Soft Errors Correcting Codes Using Parallel FFT

The increasing demand of low complexity and error tolerant design in signal processing systems is a reliability issue at ground level. Complex circuit is consistently affected by soft errors in modern electronic circuit...

Bird Eye Review: Distributed Approach for Advancement of K Means Clustering Algorithm

Clustering is the process of assigning similar objects in to one group, this group termed as clusters. To assign a similar data object in to one cluster, a well known K means clustering technique is used. In this paper...

Social Engineering

There are several techniques available to a hacker for breaching the Information Security defenses of an organization. The human approach often termed ‘Social Engineering’ and is probably the most difficult one to be de...

slugREER Leach Based Protocol in WSN

Wireless sensor network have become an active area for researchers now a days. A sensor node carry small amount of resources in terms of processor, battery power, memory and communication range, but when a great number...

Download PDF file
  • EP ID EP22593
  • DOI -
  • Views 270
  • Downloads 4

How To Cite

Neeraj . , Sonal Beniwal (2016). Digital Forensics: Analyze and Monitor Network Traffic Using Sniffer (Application Software). International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(9), -. https://www.europub.co.uk/articles/-A-22593