USING THE COLASOFT CAPSA NETWORK ANALYZER TO DIAGNOSE, PINPOINT AND DETECT A VIRIETY OF MALICIOUS CYBERATTACKS AND TO IMPROVE THE VULNERABILITIES FOR A SOHO NETWORK
USING THE COLASOFT CAPSA NETWORK ANALYZER TO DIAGNOSE, PINPOINT AND DETECT A VIRIETY OF MALICIOUS CYBERATTACKS AND TO IMPROVE THE VULNERABILITIES FOR A SOHO NETWORK
DOI:
https://doi.org/10.46687/jsar.v5i1.114Keywords:
Cyber-attacks, Network analyzing, SOHO, VulnerabilityAbstract
In this paper a high-level analyzing for different malicious attacks is made. Thanks to the real-time network analyzer Colasoft Capsa some applications problems and vulnerabilities have been detected and thereby this action ensures a protection for the hosts in the SOHO network. Nowadays it is desirable that many cyber-security professionals and net-work managers to use Colasoft Capsa in order to detect and protect the computer and net-work systems against malicious cyber-attacks.
References
Asrodia P., & Patel H., Analysis of Various Packet Sniffing Tools for Network Monitoring and Analysis, International Journal of Electrical, Electronics and Computer Engineering 1(1): 55-58(2012)
Dunaytsev, R. A., Krendzel A. V., Koucheryavy Y. A., & Harju J. J., Estimation of web traffic generated by users in home networks, Proceedings of the eighth IASTED IMSA’, Kauai, Hawaii. Retrieved from/http://www.cs.tut.fi/tlt/npg/icefin/documents/Hawaii-427-141_Final_Manuscript. pdfS, 2004
Kahya-Özyirmidokuz E., Gezer A., & Ciflikli C., Characterization of Network Traffic Data: A Data Preprocessing and Data Mining Applica-tion, In DATA ANALYTICS 2012, The First International Conference on Data Analytics, 2012, September, pp. 18-23
Kumar P. S., & Arumugam S., Establishing a valuable method of packet capture and packet analyzer tools in firewall, International Journal of Research Studies in Computing, 2012 April, Volume 1 Number 1, 11-20
Singh G., & Singh A., Campus Network Security Policies: Problems And Its Solutions, International Journal of Innovative Research and Develop-ment, June, 2013, Vol 2 Issue 6, pp.294-306
Venkatramulu S., & Rao C. G., Various Solutions for Address Resolution Protocol Spoofing Attacks, International Journal of Scientific and Research Publications, Volume 3, Issue 7, July 2013
Zaefferer M., Inanir Y. S., & Karanatsios T., Intrusion Detection, University of Applied Sciences Cologne, Faculty for Informatics and Engineer-ing, Gummersbach, February 2012
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 JOURNAL SCIENTIFIC AND APPLIED RESEARCH
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.