Providing the Secure Data Transmission in the Network Using Open Source Packet Analyzer
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2014 by IJCTT Journal|
|Year of Publication : 2014|
|Authors : Hasina A. Razzak A. Karim , S S Handa , M V Ramana Murthy|
|DOI : 10.14445/22312803/IJCTT-V12P103|
Hasina A. Razzak A. Karim , S S Handa , M V Ramana Murthy."Providing the Secure Data Transmission in the Network Using Open Source Packet Analyzer". International Journal of Computer Trends and Technology (IJCTT) V12(1):11-13, June 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Intrusion Detection System (IDS) is process of detecting intrusion in database, network or any other devicefor providing secure data transmission. In this paper, our purpose of IDS is to detect intrusion in network to provide safe and intrusion free network by using Open Source Packet Analyzer. Open Source Packet Analyzer is used to analyze network data and then that data is classified into normal data and abnormal data.
Usha Banerjee , AshutoshVashishtha and MukulSaxena, Evaluation of the capabilities of wireshark as a tool for intrusion detection
Jeff Markey, Using Decision Tree Analysis for Intrusion Detection Russ McRee, Security Analysis withWireshark.
[BOOK] Data mining: concepts and techniques J Han, M Kamber - 2006
 Qadeer, M.A. Zahid, M. ;Iqbal, A. ; Siddiqui, M.R. Network Traffic Analysis and Intrusion Detection Using PacketSniffer
Shaoqiang Wang, DongShengXu, ShiLiang Yan, Analysis and Application of Wireshark in TCP/IP Protocol.
Luo, H., Henry, P.: A common password method for protection of multipleaccounts. 14th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Vol. 3 (2003) 2749 – 2754
 Pinkas, B., Sander, T.: Securing passwords against dictionary attacks Proceedings of the 9th ACM conference on Computer and communications security Washington, DC, USA (2002 ) 161-170
 Gouda, M.G., Liu, A.X., Leung, L.M., Alam, M.A.: Single Password, Multiple Accounts. Proceedings of 3rd Applied Cryptography and Network Security Conference (industry track), New York City, New York (2005)
Intrusion Detection System, Data Mining Techniques, TCP/UDP protocol, DOS attack