Journal of Computer Science

Applying Packet Generator for Secure Network Environment

Mohammed N. Abdul Wahid and Zuriati Ahmed Zulkarnain

DOI : 10.3844/jcssp.2011.790.799

Journal of Computer Science

Volume 7, Issue 5

Pages 790-799


Problem statement: Viruses and hacker attacks typically generate a recognizable pattern or “signature” of packets. Most of Network Traffic Analyzer can identify these packets and alert the administrator to their presence on the network via email or page. Approach: Most traffics analyzers let you set alarms to be triggered when a particular pattern is seen. Results: Some network traffic analyzers can be programmed to send an email or page when these conditions are met. Of course; this assumes that the virus and its signature have been seen before and incorporated the analyzer’s list of packet filters. ((The packet filters once started the filtering process and also by using packet decode together they can determine the traffic type whether it has normal or abnormal activities. Conclusion/Recommendations: In this study we used Packet Generator to generate a traffic that supposes to act the intruder or hacker signature to prove up that Network Traffic Analysis has the ability to detect like this kind of traffics. And also we have explained in depth about network traffic analysis and its ability to monitor all the network traffics (incoming and outgoing) and view their headers and payload and all other information such as traffic source and destination)).


© 2011 Mohammed N. Abdul Wahid and Zuriati Ahmed Zulkarnain. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.