Loading…
Sniffing attacks on computer networks
The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in...
Saved in:
Published in: | Scientific Bulletin ("Mircea cel Bătrân" Naval Academy) 2020, Vol.XXIII (1), p.202-207 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c2407-f4a3fa2237ef92b546561c1b6b5b9b1daf2393eaf019f0b0ed6a174a75bcfe6f3 |
---|---|
cites | |
container_end_page | 207 |
container_issue | 1 |
container_start_page | 202 |
container_title | Scientific Bulletin ("Mircea cel Bătrân" Naval Academy) |
container_volume | XXIII |
creator | Glăvan, Dragoş Răcuciu, Ciprian Moinescu, Radu Eftimie, Sergiu |
description | The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and obtain information so that it can eventually crash or corrupt the network or read the communications that occur in the network. Sniffing attacks can be compared to touching wires and getting to know the conversation, and for this reason it is also called "wiretapping" applied to computer networks. In this paper, a sniffing attack is shared which can significantly damage the computer networks as well as methods of combating such attacks. Sniffing is usually performed to analyze network usage, troubleshoot network problems, monitor session for development and testing purposes. |
doi_str_mv | 10.21279/1454-864X-20-I1-027 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2429826362</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2429826362</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2407-f4a3fa2237ef92b546561c1b6b5b9b1daf2393eaf019f0b0ed6a174a75bcfe6f3</originalsourceid><addsrcrecordid>eNo9UE9LwzAcDaJgmfsGHgriMfrLL2nSHGWoKww8qOAtJF0i3Vwzkxbx29s58fTg8Xj_CLlkcIMMlb5lohK0luKNItCGUUB1Qop_9pQUyDXSWlfynMxz3gAAkzUAFwW5fu67ELr-vbTDYNttLmNftnG3Hwefyt4PXzFt8wU5C_Yj-_kfzsjrw_3LYklXT4_N4m5FWxSgaBCWB4vIlQ8aXSVkJVnLnHSV046tbZiacG8DMB3AgV9Ly5SwqnJt8DLwGbk6-u5T_Bx9HswmjqmfIg0K1DVKLnFSiaOqTTHn5IPZp25n07dhYH4_MYf15rDeIJiGmekT_gNFmFO4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2429826362</pqid></control><display><type>article</type><title>Sniffing attacks on computer networks</title><source>Publicly Available Content Database</source><creator>Glăvan, Dragoş ; Răcuciu, Ciprian ; Moinescu, Radu ; Eftimie, Sergiu</creator><creatorcontrib>Glăvan, Dragoş ; Răcuciu, Ciprian ; Moinescu, Radu ; Eftimie, Sergiu</creatorcontrib><description>The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and obtain information so that it can eventually crash or corrupt the network or read the communications that occur in the network. Sniffing attacks can be compared to touching wires and getting to know the conversation, and for this reason it is also called "wiretapping" applied to computer networks. In this paper, a sniffing attack is shared which can significantly damage the computer networks as well as methods of combating such attacks. Sniffing is usually performed to analyze network usage, troubleshoot network problems, monitor session for development and testing purposes.</description><identifier>ISSN: 2392-8956</identifier><identifier>ISSN: 1454-864X</identifier><identifier>EISSN: 1454-864X</identifier><identifier>EISSN: 2392-8956</identifier><identifier>DOI: 10.21279/1454-864X-20-I1-027</identifier><language>eng</language><publisher>Constanta: Naval Academy Publishing House</publisher><subject>Communications traffic ; Computer networks ; Cybercrime ; Cybersecurity ; Data ; Data encryption ; Encryption ; Hackers ; Interception ; Network security ; Packet transmission ; Security ; Theft ; Troubleshooting ; Wiretapping</subject><ispartof>Scientific Bulletin ("Mircea cel Bătrân" Naval Academy), 2020, Vol.XXIII (1), p.202-207</ispartof><rights>2020. This work is published under https://creativecommons.org/licenses/by-nc-sa/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2407-f4a3fa2237ef92b546561c1b6b5b9b1daf2393eaf019f0b0ed6a174a75bcfe6f3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2429826362/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2429826362?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,25753,27923,27924,27925,37012,44590,75126</link.rule.ids></links><search><creatorcontrib>Glăvan, Dragoş</creatorcontrib><creatorcontrib>Răcuciu, Ciprian</creatorcontrib><creatorcontrib>Moinescu, Radu</creatorcontrib><creatorcontrib>Eftimie, Sergiu</creatorcontrib><title>Sniffing attacks on computer networks</title><title>Scientific Bulletin ("Mircea cel Bătrân" Naval Academy)</title><description>The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and obtain information so that it can eventually crash or corrupt the network or read the communications that occur in the network. Sniffing attacks can be compared to touching wires and getting to know the conversation, and for this reason it is also called "wiretapping" applied to computer networks. In this paper, a sniffing attack is shared which can significantly damage the computer networks as well as methods of combating such attacks. Sniffing is usually performed to analyze network usage, troubleshoot network problems, monitor session for development and testing purposes.</description><subject>Communications traffic</subject><subject>Computer networks</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Data</subject><subject>Data encryption</subject><subject>Encryption</subject><subject>Hackers</subject><subject>Interception</subject><subject>Network security</subject><subject>Packet transmission</subject><subject>Security</subject><subject>Theft</subject><subject>Troubleshooting</subject><subject>Wiretapping</subject><issn>2392-8956</issn><issn>1454-864X</issn><issn>1454-864X</issn><issn>2392-8956</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNo9UE9LwzAcDaJgmfsGHgriMfrLL2nSHGWoKww8qOAtJF0i3Vwzkxbx29s58fTg8Xj_CLlkcIMMlb5lohK0luKNItCGUUB1Qop_9pQUyDXSWlfynMxz3gAAkzUAFwW5fu67ELr-vbTDYNttLmNftnG3Hwefyt4PXzFt8wU5C_Yj-_kfzsjrw_3LYklXT4_N4m5FWxSgaBCWB4vIlQ8aXSVkJVnLnHSV046tbZiacG8DMB3AgV9Ly5SwqnJt8DLwGbk6-u5T_Bx9HswmjqmfIg0K1DVKLnFSiaOqTTHn5IPZp25n07dhYH4_MYf15rDeIJiGmekT_gNFmFO4</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Glăvan, Dragoş</creator><creator>Răcuciu, Ciprian</creator><creator>Moinescu, Radu</creator><creator>Eftimie, Sergiu</creator><general>Naval Academy Publishing House</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7TB</scope><scope>7TN</scope><scope>7XB</scope><scope>88F</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>BKSAR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>F1W</scope><scope>FR3</scope><scope>H8D</scope><scope>H96</scope><scope>HCIFZ</scope><scope>L.G</scope><scope>L6V</scope><scope>L7M</scope><scope>M1Q</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PCBAR</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>Q9U</scope></search><sort><creationdate>2020</creationdate><title>Sniffing attacks on computer networks</title><author>Glăvan, Dragoş ; Răcuciu, Ciprian ; Moinescu, Radu ; Eftimie, Sergiu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2407-f4a3fa2237ef92b546561c1b6b5b9b1daf2393eaf019f0b0ed6a174a75bcfe6f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Communications traffic</topic><topic>Computer networks</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Data</topic><topic>Data encryption</topic><topic>Encryption</topic><topic>Hackers</topic><topic>Interception</topic><topic>Network security</topic><topic>Packet transmission</topic><topic>Security</topic><topic>Theft</topic><topic>Troubleshooting</topic><topic>Wiretapping</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Glăvan, Dragoş</creatorcontrib><creatorcontrib>Răcuciu, Ciprian</creatorcontrib><creatorcontrib>Moinescu, Radu</creatorcontrib><creatorcontrib>Eftimie, Sergiu</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Oceanic Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>Earth, Atmospheric & Aquatic Science Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ASFA: Aquatic Sciences and Fisheries Abstracts</collection><collection>Engineering Research Database</collection><collection>Aerospace Database</collection><collection>Aquatic Science & Fisheries Abstracts (ASFA) 2: Ocean Technology, Policy & Non-Living Resources</collection><collection>SciTech Premium Collection</collection><collection>Aquatic Science & Fisheries Abstracts (ASFA) Professional</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Military Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Earth, Atmospheric & Aquatic Science Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><jtitle>Scientific Bulletin ("Mircea cel Bătrân" Naval Academy)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Glăvan, Dragoş</au><au>Răcuciu, Ciprian</au><au>Moinescu, Radu</au><au>Eftimie, Sergiu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Sniffing attacks on computer networks</atitle><jtitle>Scientific Bulletin ("Mircea cel Bătrân" Naval Academy)</jtitle><date>2020</date><risdate>2020</risdate><volume>XXIII</volume><issue>1</issue><spage>202</spage><epage>207</epage><pages>202-207</pages><issn>2392-8956</issn><issn>1454-864X</issn><eissn>1454-864X</eissn><eissn>2392-8956</eissn><abstract>The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and obtain information so that it can eventually crash or corrupt the network or read the communications that occur in the network. Sniffing attacks can be compared to touching wires and getting to know the conversation, and for this reason it is also called "wiretapping" applied to computer networks. In this paper, a sniffing attack is shared which can significantly damage the computer networks as well as methods of combating such attacks. Sniffing is usually performed to analyze network usage, troubleshoot network problems, monitor session for development and testing purposes.</abstract><cop>Constanta</cop><pub>Naval Academy Publishing House</pub><doi>10.21279/1454-864X-20-I1-027</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2392-8956 |
ispartof | Scientific Bulletin ("Mircea cel Bătrân" Naval Academy), 2020, Vol.XXIII (1), p.202-207 |
issn | 2392-8956 1454-864X 1454-864X 2392-8956 |
language | eng |
recordid | cdi_proquest_journals_2429826362 |
source | Publicly Available Content Database |
subjects | Communications traffic Computer networks Cybercrime Cybersecurity Data Data encryption Encryption Hackers Interception Network security Packet transmission Security Theft Troubleshooting Wiretapping |
title | Sniffing attacks on computer networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T15%3A27%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Sniffing%20attacks%20on%20computer%20networks&rft.jtitle=Scientific%20Bulletin%20(%22Mircea%20cel%20B%C4%83tr%C3%A2n%22%20Naval%20Academy)&rft.au=Gl%C4%83van,%20Drago%C5%9F&rft.date=2020&rft.volume=XXIII&rft.issue=1&rft.spage=202&rft.epage=207&rft.pages=202-207&rft.issn=2392-8956&rft.eissn=1454-864X&rft_id=info:doi/10.21279/1454-864X-20-I1-027&rft_dat=%3Cproquest_cross%3E2429826362%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c2407-f4a3fa2237ef92b546561c1b6b5b9b1daf2393eaf019f0b0ed6a174a75bcfe6f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2429826362&rft_id=info:pmid/&rfr_iscdi=true |