Detection Suspicious Activities on Network Package Traffic

Abstract

One problem of computer network security was that unauthorized people had access to websites on the internet—the way to interject malicious programs that aim to send viruses and even commit data theft. Therefore, it was critical to understand the types of attacks in the different forms of crime that can not only harm organizational infrastructure but also affect financially. Detection of criminal activities was carried out with the help of Wireshark Software to view data packets, which indicated criminal programs carried out by intruders secretly on the official website. The capture packets on the running network had suspicious packets as evidence that led to malware infections. Therefore, both the owner and website users needed security protection by planning strategies to overcome criminal activities that infect websites.


Keywords: malicious programs, malware, network package traffic, Wireshark

References
[1] Furnell S, Collins E. Cyber security: What are we talking about? Comput Fraud Secur. 2021;2021(7):6–11.

[2] Sikos LF. Packet analysis for network forensics: A comprehensive survey. Forensic Sci Int Digit Investig. 2020;32:200892.

[3] Avasthi D. “Network forensic analysis with efficient preservation for SYN attack.” Int J Comput Appl. 2012;46(24):17–22. [Online]. Available: http: //scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:Network+Forensic+ Analysis+with+Efficient+Preservation+for+SYN+Attack#0

[4] “Wireshark.” https://www.wireshark.org/

[5] Vancea CM, Dobrota V, Wireshark AP. “SNMP Agent for WLAN networks.” no. 216041, 1998.

[6] Sibi Chakkaravarthy S, Sangeetha D, Vaidehi V. A survey on malware analysis and mitigation techniques. Comput Sci Rev. 2019;32:1–23.

[7] Babu NM, Murali G. “Malware detection for multi cloud servers using intermediate monitoring server.” Int Conf Energy Commun Data Anal Soft Comput (ICECDS). 2017;3609–3612. 2018.

[8] Goli YD, Ambika R. “Network traffic classification techniques-A review.” Proc Int Conf Comput Tech Electron Mech Syst (CTEMS) 2018;219–222.

[9] Navabud P. “Analyzing thewebmail using Wireshark.” pp. 1237–1239.

[10] Sandhya S, Purkayastha S, Joshua E, Deep A. “Assessment of website security by penetration testing using Wireshark.” 2017 4th Int Conf Adv Comput Commun Syst (ICACCS) 2017;4–7. https://doi.org/10.1109/ICACCS.2017.8014711.

[11] Malecki F. Defending your business from exploit kits. Comput Fraud Secur. 2013;2013(6):19–20.