Packet Analysis
13,738 Followers
Recent papers in Packet Analysis
Traffic analysis consists of capturing network traffic in order to identify and respond to anomalies that could be indicative of security threats or other areas of concern. The communication, network, and technological infrastructures... more
This paper was designed to provide Intranet traffic monitoring by sniffing the packets at the local Area Network (LAN) server end to provide security and control. It was implemented using five computer systems configured with static... more
g o w e r p u b . c o m g o w e r p u b . c o m g o w e r p u b . c o m g o w e r p u b . c o m g o w e r p u b . c o m g o w e r p u b . c o m g o w e r p u b . c o m g o w e r p u b . c o m © Copyrighted Material © Copyrighted Material
Network monitoring signifies to the practice of managing the procedure of a computer network using specified management software tools. As network persist to grow,it isvery important that network administrators are responsive of the... more
Migration from IPv4 to IPv6 is still visibly slow, mainly because of the inherent cost involved in the implementation, hardware and software acquisition. However, there are many values IPv6 can bring to the IP enabled environment as... more
In this paper, we propose a new block cipher called BC2 (Block Cipher 2). We make a cipher using components that are believed secure. The structure of BC2 is very simple. We use Feistel network with input-output 128 bits, matrix Maximum... more
Communication network plays an important role in providing safe vehicular movement. The main achievement of VANET is providing comfort and safety for passengers. In addition to that, various transactions like information on accident, road... more
The exponential rise in wireless communication systems and allied applications has revitalized academiaindustries to achieve more efficient data transmission system to meet Quality-of-Service (QoS) demands. Amongst major wireless... more
IP filtering is a technique used to control IP packets flow in and out of a network where Filter engine inspects at source and destination IP of incoming and outgoing packets. Here Filter engine is designed to improve the performance of... more
This work has the goal to study how an efficient deep packet inspection (DPI) algorithm may be implemented using the graphical processing unit (GPU) CUDA (Computer Unified Device Architecture) enabled boards existing in personal... more
CHU Time Station Proposal for Western Canada, to compliment WWV, WWVH, WWVB time stations.
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and alternative cluster head node, problem... more
Through this article, we try to offer alternative solutions to handle DDoS attacks. The discussion begins with a study of literature on DDoS attacks that include the mechanism of DDoS attack detection proposed by several researchers. The... more
—Networks are getting greater and more compound, yet superintendents rely on elementary tools such as and to debug problems. Thus, an programmed and organised approach for testing and debugging networks called " Automatic Test Packet... more
With the rapid development of multimedia and network technology, people can access a large number of multimedia information. For people who want to make full use of multimedia information resources, the primary question is how to query... more
"PURPOSE: To evaluate the accuracy of detecting cephalometric landmarks automatically by computer. MATERIALS AND METHODS: Digital image processing algorithms (edge-based and morphological) in addition to mathematical algorithms... more
Various factors can have a significant degrading impact on the residential Voice over Internet Protocol (VoIP) phone services' quality. Hybrid fibre-coaxial (HFC) networks typically carry three types of traffic that include voice, data,... more
This thesis addresses the problem of identifying and tracking digital information that is shared using peer-to-peer file transfer and Voice over IP (VoIP) protocols. The goal of the research is to develop a system for detecting and... more
This paper develops a prototyping technique for information systems security policies. Starting from the algebraic specification of a security policy, we derive an executable specification that represents a prototype of the actual policy.... more
One of the metrics used to ensure an efficient management of network services is the packet delay. However, packet delay is highly variable due to queuing mechanism in many network devices, including the host systems. In this paper, the... more
Multimedia is one of the most popular data shared in the Web, and the protection of it via encryption techniques is of vast interest. In this paper, a secure and computationally feasible Algorithm called Optimized Multiple Huffman Tables... more
Recently, many new cyber-attacks like Phishing, Spear Phishing, Cross-Site Scripting (XSS), Denial of Service (DoS), SQL injection including, Man-In-The-Middle (MITM) attack, etc are originated in the transmission of data over a network.... more
The proliferation of multimedia encryption techniques allows securing various applications including tele-browsing and visio-conferencing. However, these techniques may also constitute useful tools for malicious users to transmit... more
Keywords: Windows Xp, arabic, keyboard, cell, acronyms, wizard
ويندوز إيكسبي، ويندوز إكس بي بالعربية، لوحة المفاتيح مفتاح تعديل، ثبات المفاتيح،
خلية، معالج،أحرف، مركز التعليمات والدعم،
ويندوز إيكسبي، ويندوز إكس بي بالعربية، لوحة المفاتيح مفتاح تعديل، ثبات المفاتيح،
خلية، معالج،أحرف، مركز التعليمات والدعم،
Through this article, we try to offer alternative solutions to handle DDoS attacks. The discussion begins with a study of literature on DDoS attacks that include the mechanism of DDoS attack detection proposed by several researchers. The... more
This paper proposes a reliable system to overcome the weakness of current the HF radio communication system for oceanic aeronautical flight routes. This system uses only one aeronautical VHF channel with air-to-air radio relay system... more
In this paper, we propose a new block cipher called BC2 (Block Cipher 2). We make a cipher using components that are believed secure. The structure of BC2 is very simple. We use Feistel network with input-output 128 bits, matrix Maximum... more
Various factors can have a significant degrading impact on the residential Voice over Internet Protocol (VoIP) phone services' quality. Hybrid fibre-coaxial (HFC) networks typically carry three types of traffic that include voice,... more
In this research work we have proposed a machine to machine model of authentication. This model is applicable where multiple electronic devices are working continuously 24 hours for monitoring and periodically need to have authentication... more
IP filtering is a technique used to control IP packets flow in and out of a network where Filter engine inspects at source and destination IP of incoming and outgoing packets. Here Filter engine is designed to improve the performance of... more
In this paper, we propose a new block cipher called BC2 (Block Cipher 2). We make a cipher using components that are believed secure. The structure of BC2 is very simple. We use Feistel network with input-output 128 bits, matrix Maximum... more
This paper was designed to provide Intranet traffic monitoring by sniffing the packets at the local Area Network (LAN) server end to provide security and control. It was implemented using five computer systems configured with static... more
Handling massive data flows in the online intrusion detection systems is considered one of the major challenges in computer network security. This paper presents a novel method that overcomes this challenge using data mining and... more
In the most intrusion detection systems (IDS), a system tries to learn characteristics of different type of attacks by analyzing packets that sent or received in network. These packets have a lot of features. But not all of them is... more
In this research work we have proposed a machine to machine model of authentication. This model is applicable where multiple electronic devices are working continuously 24 hours for monitoring and periodically need to have authentication... more
Multimedia is one of the most popular data shared in the Web, and the protection of it via encryption techniques is of vast interest. In this paper, a secure and computationally feasible Algorithm called Optimized Multiple Huffman Tables... more
Your article is protected by copyright and all rights are held exclusively by Springer-Verlag London. This e-offprint is for personal use only and shall not be self-archived in electronic repositories. If you wish to self-archive your... more
Wireless Sensor networks are a challenging task due to the lack of resources in the network as well as the frequent changes in network topology. Various routing protocols are designed basically to establish correct and efficient paths... more
Wireless sensor networks are useful for streaming multimedia in infrastructure-free and hazardous environments. However, these networks are quite different from their wired counterpart and are composed of nodes with constrained bandwidth... more
Communication links in a sensor network are unstable such that running conventional TCP protocol over a high loss rate sensor networks will suffer from severe performance degradation. To handle a packet loss, conventional TCP retransmits... more