Published June 17, 2025
| Version v1
Journal article
Open
Analyzing Real-Time Network Traffic Through Packet Sniffing: A Wireshark-Based Case Study
Description
In the modern digital age, the security and performance of computer networks have become critical concerns. This paper investigates the application of packet sniffing as a technique for network traffic analysis, focusing specifically on the use of Wireshark, an open-source protocol analyzer. We analyze various types of network packets, monitor traffic behavior, identify potential security vulnerabilities, and evaluate performance bottlenecks. The study demonstrates the power and limitations of Wireshark in both academic and professional environments and proposes best practices for ethical and efficient network analysis.
Files
Analyzing Real-Time Network Traffic Through Packet Sniffing A Wireshark-Based Case Study -Formatted Paper.pdf
Files
(312.3 kB)
Name | Size | Download all |
---|---|---|
md5:6a93b4512760fcdd24283b295085c3c7
|
312.3 kB | Preview Download |
Additional details
References
- 1. Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication.
- 2. Kurose, J.F., & Ross, K.W. (2021). Computer Networking: A Top-Down Approach. 8th Edition, Pearson.
- 3. Bejtlich, R. (2013). The Practice of Network Security Monitoring: Understanding Incident Detection and Response. No Starch Press. SANS Institute. (2022).
- 4. Caswell, B., & Beale, J. (2004). Snort 2.1 Intrusion Detection, Second Edition. Syngres.
- 5. Tripathy, S. S., & Behera, B. (2024). EVALUATION OF FUTURE PERSPECTIVES ON SNORT AND WIRESHARK AS TOOLS AND TECHNIQUES FOR INTRUSION DETECTION SYSTEM. Available at SSRN 5048278.
- 6. Jin, H. J., Ghashghaei, F. R., Elmrabit, N., Ahmed, Y., & Yousefi, M. (2024). Enhancing Sniffing Detection in IoT Home Wi-Fi Networks: An Ensemble Learning Approach With Network Monitoring System (NMS). IEEE Access.
- 7. Verma, P. (2015). Wireshark network security. Packt Publishing Ltd.
- 8. Nainar, N. K., & Panda, A. Wireshark for Network Forensics.
- 9. Bagyalakshmi, G., Rajkumar, G., Arunkumar, N., Easwaran, M., Narasimhan, K., Elamaran, V., ... & Ramirez-Gonzalez, G. (2018). Network vulnerability analysis on brain signal/image databases using Nmap and Wireshark tools. Ieee Access, 6, 57144-57151.
- 10. Nandita, G. R., Rani, U., & Gowda, N. C. (2023). Network Troubleshooting Simulator Using Wireshark. International Journal of Computational Learning & Intelligence, 2(4), 155-162.