NUST Institutional Repository

REAL TIME PASSIVE NETWORK MONITORING ON SWITCHED NETWORKS

Show simple item record

dc.contributor.author DR SHOAB A KHAN, FARAZ MUKHTAR,WASIF RIAZ,AMENA, AHMAD NAZIR, SHAH HASSAN,
dc.date.accessioned 2025-04-24T07:47:51Z
dc.date.available 2025-04-24T07:47:51Z
dc.date.issued 2007
dc.identifier.other DE-COMP-25
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/52332
dc.description supervisor DR SHOAB A KHAN en_US
dc.description.abstract Without strong motivation for change, insecure network protocols and their implementations often go uncorrected, leaving much of the Internet vulnerable to attacks the research community has warned about for years. In a non-switched network environment, sniffing and packet monitoring is an easy thing to do. This is because in non-switched networks, the network traffic is sent to a hub, which broadcasts it to everyone. Switched networks are completely different in the way they operate; switches work by sending traffic to the destination host only. A switched network does not lend itself to sniffing as easily as a non-switched network does since it does not broadcast most frames. This creates difficulty in sniffing switched networks. The development of switched networks was driven by the need for more bandwidth, not for the need of more secure networks. Indeed, investigation reveals that several methods are now available to sniff switched networks. But we cannot just sniff the packets from the wire and get into the switch. The reason being, we are in switched network and switches do not do any favor to the hackers. They transmit data only between the talking machines. The purpose of this project is to capture the traffic on a switched network passively and to direct it to the front-end where users can monitor and manipulate the captured data. The system is divided into two basic parts; a sniffing device and a front end processor. The sniffing device is connected to the LAN, from where it passively sniffs and sends the iv captured packets to the front-end processor. The front-end processor is used for remote access of the sniffing device, monitoring the captured packets and displaying them in a user-friendly GUI. Different techniques like ARP Cache Poisoning, CAM Table Flooding and DNS Cache Poisoning have been used for redirecting etwork traffic towards us. At the front-end, a user-friendly GUI has been made for easy interaction, analyzing and manipulation of data. For capturing packets without the loss of information, and for its optimization, filtering en_US
dc.language.iso en en_US
dc.publisher College of Electrical & Mechanical Engineering (CEME), NUST en_US
dc.title REAL TIME PASSIVE NETWORK MONITORING ON SWITCHED NETWORKS en_US
dc.type Project Report en_US


Files in this item

This item appears in the following Collection(s)

  • BS [461]

Show simple item record

Search DSpace


Advanced Search

Browse

My Account