Download presentation
Presentation is loading. Please wait.
Published byMildred Ray Modified over 8 years ago
1
DEFIANA ARNALDY,M.SI 0818 0296 4763 DEFF_ARNALDY@YAHOO.COM ANALYZING NETWORK PACKETS
2
OVERVIEW Introduction IP-level network tapping Layer 2 network tapping Physical network tapping Conclusion
3
INTRODUCTION The Need to look at what is moving between the client and server, you encounter a problem. it is a security risk to have one program that could scan third-party applications Packet capture isn’t something new
5
Software that can leverage packet-level data can be useful for businesses. providing an early warning system for bandwidth misuse detect packets on a network that could uncover viruses, use of unauthorized software, and email forgery. Denial-of-service attacks could be detected from the presence of a large number of corrupted packets sent to a particular server.
6
IP-LEVEL NETWORK TAPPING Network tapping anything that runs at the IP level includes TCP/IP and UDP and everything above that, such as DNS, HTTP, FTP, and so forth. Praktek
7
LAYER 2 NETWORK TAPPING When you tap into (sniff ) network traffic at level 2, you receive not only data from other applications on your computer, but also from other applications on different computers that are on the same network WinPCap is, in essence, a driver that enables you to read packets directly from a network adapter.
8
Praktek
9
PHYSICAL NETWORK TAPPING Although there would be no conceivable reason for software to read data at this low level, it might be important to know whether the phone line is connected to the computer or not A program might also want to determine the type of connection the computer has to the Internet
10
CONCLUSION This chapter has shown three different means to tap nonintrusively into the data that flows between computers
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.