PERFORMANCE AND CONNECTION ANALYSIS OF THE COMPUTER SYSTEMS AND NETWORKS

PERFORMANCE AND CONNECTION ANALYSIS OF THE COMPUTER SYSTEMS AND NETWORKS

Authors

  • Petar Boyanov DEPARTMENT OF COMMUNICATION AND COMPUTER TECHNOLOGY, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712, 115, UNIVERSITETSKA STR,

DOI:

https://doi.org/10.46687/jsar.v6i1.151

Keywords:

Connection analysis, cyber-attacks, Monitoring, Performance, Scanning, Vulnerabilities, Windows 7, Computer and network security

Abstract

In this paper a performance and connection analysis of determined computer systems and networks is made. Each communication process and state must be daily scanned and analyzed by system administrators, security-professionals and IT specialists. Ensuring a secure flow of computer and network processes and performance is very important priority for many large and small companies and for normal users. Most of the malicious user and programmers use vulnerability in the selected network via determined computer and network processes.

Author Biography

Petar Boyanov, DEPARTMENT OF COMMUNICATION AND COMPUTER TECHNOLOGY, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712, 115, UNIVERSITETSKA STR,

DEPARTMENT OF COMMUNICATION AND COMPUTER TECHNOLOGY, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712, 115, UNIVERSITETSKA STR

ORCID iD icon https://orcid.org/0000-0003-3668-6713  

References

Banerjee, Usha; Vashishtha, Ashutosh; Saxena, Mukul. Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection. International Journal of Computer Applications, 2010, 6.7.

Chapell, L. Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide, Protocol Analysis Institute. EE. UU. Editorial Chapell University, 2010.

Combs, Gerald, et al. Wireshark: Go deep. ArGo Software Design Homepage, 2008, 31.

Dabir, A.; Matrawy, A. Bottleneck analysis of traffic monitoring using wireshark. In: Innovations in Information Technology, 2007. IIT'07. 4th International Conference on. IEEE, 2007. p. 158-162.

Hnatyshin, Vasil Y.; LOBO, Andrea F. Undergraduate data communications and networking projects using opnet and wireshark software. ACM SIGCSE Bulletin, 2008, 40.1: 241-245.

Liu, Lei, et al. Experimental demonstration and comparison of distributed and centralized multi-domain resilient translucent WSON. In: Proceedings of 36th European Conference and Exhibition on Optical Communication (ECOC 2010), paper We. 2010. p. 1-3.

Luo, Qing-Lin, et al. Network protocol parser and verification method based on Wireshark. Computer Engineering and Design, 2011, 32.3: 770-773.

Mcree, Russ. Security Analysis with Wireshark. ISSA Journal, 2006, 39-45.

Munz, Gerhard; CARLE, Georg. Distributed network analysis using TOPAS and Wireshark. In: Network Operations and Management Symposium Workshops, 2008. NOMS Workshops 2008. IEEE. IEEE, 2008. p. 161-164.

Orebaugh, A.; Ramirez, Gilbert; Burke, J. Wireshark. Ethereal network protocol analyzer toolkit. 2006.

Seagren, Eric. Secure your network for free: using NMAP, Wireshark, Snort, Nessus, and MRTG. Syngress, 2007.

Wang, Shaoqiang; Xu, DongSheng; Yan, ShiLiang. Analysis and application of wireshark in TCP/IP protocol teaching. In: E-Health Networking, Digital Ecosystems and Technologies (EDT), 2010 International Conference on. IEEE, 2010. p. 269-272.

WIKI, Wireshark. Ethernet capture setup.[Online] Available at: http://wiki.Wireshark.org. FrontPage [Accessed: 10.09. 2012.].

Downloads

Published

10.03.2023

How to Cite

Boyanov, P. (2023). PERFORMANCE AND CONNECTION ANALYSIS OF THE COMPUTER SYSTEMS AND NETWORKS: PERFORMANCE AND CONNECTION ANALYSIS OF THE COMPUTER SYSTEMS AND NETWORKS. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 6(1), 141–147. https://doi.org/10.46687/jsar.v6i1.151

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 > >>