Loading…

Sniffing attacks on computer networks

The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in...

Full description

Saved in:
Bibliographic Details
Published in:Scientific Bulletin ("Mircea cel Bătrân" Naval Academy) 2020, Vol.XXIII (1), p.202-207
Main Authors: Glăvan, Dragoş, Răcuciu, Ciprian, Moinescu, Radu, Eftimie, Sergiu
Format: Article
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c2407-f4a3fa2237ef92b546561c1b6b5b9b1daf2393eaf019f0b0ed6a174a75bcfe6f3
cites
container_end_page 207
container_issue 1
container_start_page 202
container_title Scientific Bulletin ("Mircea cel Bătrân" Naval Academy)
container_volume XXIII
creator Glăvan, Dragoş
Răcuciu, Ciprian
Moinescu, Radu
Eftimie, Sergiu
description The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and obtain information so that it can eventually crash or corrupt the network or read the communications that occur in the network. Sniffing attacks can be compared to touching wires and getting to know the conversation, and for this reason it is also called "wiretapping" applied to computer networks. In this paper, a sniffing attack is shared which can significantly damage the computer networks as well as methods of combating such attacks. Sniffing is usually performed to analyze network usage, troubleshoot network problems, monitor session for development and testing purposes.
doi_str_mv 10.21279/1454-864X-20-I1-027
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2429826362</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2429826362</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2407-f4a3fa2237ef92b546561c1b6b5b9b1daf2393eaf019f0b0ed6a174a75bcfe6f3</originalsourceid><addsrcrecordid>eNo9UE9LwzAcDaJgmfsGHgriMfrLL2nSHGWoKww8qOAtJF0i3Vwzkxbx29s58fTg8Xj_CLlkcIMMlb5lohK0luKNItCGUUB1Qop_9pQUyDXSWlfynMxz3gAAkzUAFwW5fu67ELr-vbTDYNttLmNftnG3Hwefyt4PXzFt8wU5C_Yj-_kfzsjrw_3LYklXT4_N4m5FWxSgaBCWB4vIlQ8aXSVkJVnLnHSV046tbZiacG8DMB3AgV9Ly5SwqnJt8DLwGbk6-u5T_Bx9HswmjqmfIg0K1DVKLnFSiaOqTTHn5IPZp25n07dhYH4_MYf15rDeIJiGmekT_gNFmFO4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2429826362</pqid></control><display><type>article</type><title>Sniffing attacks on computer networks</title><source>Publicly Available Content Database</source><creator>Glăvan, Dragoş ; Răcuciu, Ciprian ; Moinescu, Radu ; Eftimie, Sergiu</creator><creatorcontrib>Glăvan, Dragoş ; Răcuciu, Ciprian ; Moinescu, Radu ; Eftimie, Sergiu</creatorcontrib><description>The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and obtain information so that it can eventually crash or corrupt the network or read the communications that occur in the network. Sniffing attacks can be compared to touching wires and getting to know the conversation, and for this reason it is also called "wiretapping" applied to computer networks. In this paper, a sniffing attack is shared which can significantly damage the computer networks as well as methods of combating such attacks. Sniffing is usually performed to analyze network usage, troubleshoot network problems, monitor session for development and testing purposes.</description><identifier>ISSN: 2392-8956</identifier><identifier>ISSN: 1454-864X</identifier><identifier>EISSN: 1454-864X</identifier><identifier>EISSN: 2392-8956</identifier><identifier>DOI: 10.21279/1454-864X-20-I1-027</identifier><language>eng</language><publisher>Constanta: Naval Academy Publishing House</publisher><subject>Communications traffic ; Computer networks ; Cybercrime ; Cybersecurity ; Data ; Data encryption ; Encryption ; Hackers ; Interception ; Network security ; Packet transmission ; Security ; Theft ; Troubleshooting ; Wiretapping</subject><ispartof>Scientific Bulletin ("Mircea cel Bătrân" Naval Academy), 2020, Vol.XXIII (1), p.202-207</ispartof><rights>2020. This work is published under https://creativecommons.org/licenses/by-nc-sa/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2407-f4a3fa2237ef92b546561c1b6b5b9b1daf2393eaf019f0b0ed6a174a75bcfe6f3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2429826362/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2429826362?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,25753,27923,27924,27925,37012,44590,75126</link.rule.ids></links><search><creatorcontrib>Glăvan, Dragoş</creatorcontrib><creatorcontrib>Răcuciu, Ciprian</creatorcontrib><creatorcontrib>Moinescu, Radu</creatorcontrib><creatorcontrib>Eftimie, Sergiu</creatorcontrib><title>Sniffing attacks on computer networks</title><title>Scientific Bulletin ("Mircea cel Bătrân" Naval Academy)</title><description>The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and obtain information so that it can eventually crash or corrupt the network or read the communications that occur in the network. Sniffing attacks can be compared to touching wires and getting to know the conversation, and for this reason it is also called "wiretapping" applied to computer networks. In this paper, a sniffing attack is shared which can significantly damage the computer networks as well as methods of combating such attacks. Sniffing is usually performed to analyze network usage, troubleshoot network problems, monitor session for development and testing purposes.</description><subject>Communications traffic</subject><subject>Computer networks</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Data</subject><subject>Data encryption</subject><subject>Encryption</subject><subject>Hackers</subject><subject>Interception</subject><subject>Network security</subject><subject>Packet transmission</subject><subject>Security</subject><subject>Theft</subject><subject>Troubleshooting</subject><subject>Wiretapping</subject><issn>2392-8956</issn><issn>1454-864X</issn><issn>1454-864X</issn><issn>2392-8956</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNo9UE9LwzAcDaJgmfsGHgriMfrLL2nSHGWoKww8qOAtJF0i3Vwzkxbx29s58fTg8Xj_CLlkcIMMlb5lohK0luKNItCGUUB1Qop_9pQUyDXSWlfynMxz3gAAkzUAFwW5fu67ELr-vbTDYNttLmNftnG3Hwefyt4PXzFt8wU5C_Yj-_kfzsjrw_3LYklXT4_N4m5FWxSgaBCWB4vIlQ8aXSVkJVnLnHSV046tbZiacG8DMB3AgV9Ly5SwqnJt8DLwGbk6-u5T_Bx9HswmjqmfIg0K1DVKLnFSiaOqTTHn5IPZp25n07dhYH4_MYf15rDeIJiGmekT_gNFmFO4</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Glăvan, Dragoş</creator><creator>Răcuciu, Ciprian</creator><creator>Moinescu, Radu</creator><creator>Eftimie, Sergiu</creator><general>Naval Academy Publishing House</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7TB</scope><scope>7TN</scope><scope>7XB</scope><scope>88F</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>BKSAR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>F1W</scope><scope>FR3</scope><scope>H8D</scope><scope>H96</scope><scope>HCIFZ</scope><scope>L.G</scope><scope>L6V</scope><scope>L7M</scope><scope>M1Q</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PCBAR</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>Q9U</scope></search><sort><creationdate>2020</creationdate><title>Sniffing attacks on computer networks</title><author>Glăvan, Dragoş ; Răcuciu, Ciprian ; Moinescu, Radu ; Eftimie, Sergiu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2407-f4a3fa2237ef92b546561c1b6b5b9b1daf2393eaf019f0b0ed6a174a75bcfe6f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Communications traffic</topic><topic>Computer networks</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Data</topic><topic>Data encryption</topic><topic>Encryption</topic><topic>Hackers</topic><topic>Interception</topic><topic>Network security</topic><topic>Packet transmission</topic><topic>Security</topic><topic>Theft</topic><topic>Troubleshooting</topic><topic>Wiretapping</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Glăvan, Dragoş</creatorcontrib><creatorcontrib>Răcuciu, Ciprian</creatorcontrib><creatorcontrib>Moinescu, Radu</creatorcontrib><creatorcontrib>Eftimie, Sergiu</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Oceanic Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>Earth, Atmospheric &amp; Aquatic Science Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ASFA: Aquatic Sciences and Fisheries Abstracts</collection><collection>Engineering Research Database</collection><collection>Aerospace Database</collection><collection>Aquatic Science &amp; Fisheries Abstracts (ASFA) 2: Ocean Technology, Policy &amp; Non-Living Resources</collection><collection>SciTech Premium Collection</collection><collection>Aquatic Science &amp; Fisheries Abstracts (ASFA) Professional</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Military Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Earth, Atmospheric &amp; Aquatic Science Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><jtitle>Scientific Bulletin ("Mircea cel Bătrân" Naval Academy)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Glăvan, Dragoş</au><au>Răcuciu, Ciprian</au><au>Moinescu, Radu</au><au>Eftimie, Sergiu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Sniffing attacks on computer networks</atitle><jtitle>Scientific Bulletin ("Mircea cel Bătrân" Naval Academy)</jtitle><date>2020</date><risdate>2020</risdate><volume>XXIII</volume><issue>1</issue><spage>202</spage><epage>207</epage><pages>202-207</pages><issn>2392-8956</issn><issn>1454-864X</issn><eissn>1454-864X</eissn><eissn>2392-8956</eissn><abstract>The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and obtain information so that it can eventually crash or corrupt the network or read the communications that occur in the network. Sniffing attacks can be compared to touching wires and getting to know the conversation, and for this reason it is also called "wiretapping" applied to computer networks. In this paper, a sniffing attack is shared which can significantly damage the computer networks as well as methods of combating such attacks. Sniffing is usually performed to analyze network usage, troubleshoot network problems, monitor session for development and testing purposes.</abstract><cop>Constanta</cop><pub>Naval Academy Publishing House</pub><doi>10.21279/1454-864X-20-I1-027</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2392-8956
ispartof Scientific Bulletin ("Mircea cel Bătrân" Naval Academy), 2020, Vol.XXIII (1), p.202-207
issn 2392-8956
1454-864X
1454-864X
2392-8956
language eng
recordid cdi_proquest_journals_2429826362
source Publicly Available Content Database
subjects Communications traffic
Computer networks
Cybercrime
Cybersecurity
Data
Data encryption
Encryption
Hackers
Interception
Network security
Packet transmission
Security
Theft
Troubleshooting
Wiretapping
title Sniffing attacks on computer networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T15%3A27%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Sniffing%20attacks%20on%20computer%20networks&rft.jtitle=Scientific%20Bulletin%20(%22Mircea%20cel%20B%C4%83tr%C3%A2n%22%20Naval%20Academy)&rft.au=Gl%C4%83van,%20Drago%C5%9F&rft.date=2020&rft.volume=XXIII&rft.issue=1&rft.spage=202&rft.epage=207&rft.pages=202-207&rft.issn=2392-8956&rft.eissn=1454-864X&rft_id=info:doi/10.21279/1454-864X-20-I1-027&rft_dat=%3Cproquest_cross%3E2429826362%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c2407-f4a3fa2237ef92b546561c1b6b5b9b1daf2393eaf019f0b0ed6a174a75bcfe6f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2429826362&rft_id=info:pmid/&rfr_iscdi=true