PERFORMANCE AND CONNECTION ANALYSIS OF THE COMPUTER SYSTEMS AND NETWORKS
PERFORMANCE AND CONNECTION ANALYSIS OF THE COMPUTER SYSTEMS AND NETWORKS
DOI:
https://doi.org/10.46687/jsar.v6i1.151Keywords:
Connection analysis, cyber-attacks, Monitoring, Performance, Scanning, Vulnerabilities, Windows 7, Computer and network securityAbstract
In this paper a performance and connection analysis of determined computer systems and networks is made. Each communication process and state must be daily scanned and analyzed by system administrators, security-professionals and IT specialists. Ensuring a secure flow of computer and network processes and performance is very important priority for many large and small companies and for normal users. Most of the malicious user and programmers use vulnerability in the selected network via determined computer and network processes.
References
Banerjee, Usha; Vashishtha, Ashutosh; Saxena, Mukul. Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection. International Journal of Computer Applications, 2010, 6.7.
Chapell, L. Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide, Protocol Analysis Institute. EE. UU. Editorial Chapell University, 2010.
Combs, Gerald, et al. Wireshark: Go deep. ArGo Software Design Homepage, 2008, 31.
Dabir, A.; Matrawy, A. Bottleneck analysis of traffic monitoring using wireshark. In: Innovations in Information Technology, 2007. IIT'07. 4th International Conference on. IEEE, 2007. p. 158-162.
Hnatyshin, Vasil Y.; LOBO, Andrea F. Undergraduate data communications and networking projects using opnet and wireshark software. ACM SIGCSE Bulletin, 2008, 40.1: 241-245.
Liu, Lei, et al. Experimental demonstration and comparison of distributed and centralized multi-domain resilient translucent WSON. In: Proceedings of 36th European Conference and Exhibition on Optical Communication (ECOC 2010), paper We. 2010. p. 1-3.
Luo, Qing-Lin, et al. Network protocol parser and verification method based on Wireshark. Computer Engineering and Design, 2011, 32.3: 770-773.
Mcree, Russ. Security Analysis with Wireshark. ISSA Journal, 2006, 39-45.
Munz, Gerhard; CARLE, Georg. Distributed network analysis using TOPAS and Wireshark. In: Network Operations and Management Symposium Workshops, 2008. NOMS Workshops 2008. IEEE. IEEE, 2008. p. 161-164.
Orebaugh, A.; Ramirez, Gilbert; Burke, J. Wireshark. Ethereal network protocol analyzer toolkit. 2006.
Seagren, Eric. Secure your network for free: using NMAP, Wireshark, Snort, Nessus, and MRTG. Syngress, 2007.
Wang, Shaoqiang; Xu, DongSheng; Yan, ShiLiang. Analysis and application of wireshark in TCP/IP protocol teaching. In: E-Health Networking, Digital Ecosystems and Technologies (EDT), 2010 International Conference on. IEEE, 2010. p. 269-272.
WIKI, Wireshark. Ethernet capture setup.[Online] Available at: http://wiki.Wireshark.org. FrontPage [Accessed: 10.09. 2012.].
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 JOURNAL SCIENTIFIC AND APPLIED RESEARCH
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.