2020
DOI: 10.1109/access.2020.3016076
|View full text |Cite
|
Sign up to set email alerts
|

Sniffing Detection Based on Network Traffic Probing and Machine Learning

Abstract: Cyber attacks are on the rise and each day cyber criminals are developing more and more sophisticated methods to compromise the security of their targets. Sniffing is one of the most important techniques that enables the attacker to collect information on the vulnerabilities of the devices, protocols and applications that can be exploited within the targeted network. It relies mainly on passively analyzing the traffic exchanged within the network, and due to its nature, such an activity is difficult to discove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 11 publications
(24 reference statements)
0
12
0
Order By: Relevance
“…Most of the work in the literature has tried to mitigate the effectiveness of passive eavesdroppers. For instance, papers [7], [10], [13], [14] focused on how to decrease the probability of sniffing packets via eavesdroppers in wireless networks by using information theory, jamming, or power control techniques. However, these techniques, like power transmission control [13], may increase the probability of capturing packets by the active eavesdroppers, or even they are fruitless in the face of them [12].…”
Section: Motivationsmentioning
confidence: 99%
See 3 more Smart Citations
“…Most of the work in the literature has tried to mitigate the effectiveness of passive eavesdroppers. For instance, papers [7], [10], [13], [14] focused on how to decrease the probability of sniffing packets via eavesdroppers in wireless networks by using information theory, jamming, or power control techniques. However, these techniques, like power transmission control [13], may increase the probability of capturing packets by the active eavesdroppers, or even they are fruitless in the face of them [12].…”
Section: Motivationsmentioning
confidence: 99%
“…From a broad perspective, there are two major methods to detect sniffers or eavesdroppers in all types of networks [14]:…”
Section: Eavesdropping Detection Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…We faced several main is-sues at this point, which gave us a hard time [29]. The irst dif iculty was sending the parsed packets captured by way of snif ing the network instantaneously [30,31] to the web application and displaying them as graphs. Because no other process can be performed when the network is sniffed.…”
Section: Fundamental Difficulties In the Studymentioning
confidence: 99%