Proceedings of the 1st International Conference on Innovation in Information Technology and Business (ICIITB 2022)

Effectiveness of Wireshark Tool for Detecting Attacks and Vulnerabilities in Network Traffic

Authors
Nawal A. L. Mabsali1, *, Hothefa Jassim1, Joseph Mani1
1Modern College of Business and Science, Muscat, Sultanate of Oman
*Corresponding author. Email: 20212797@mcbs.edu.om
Corresponding Author
Nawal A. L. Mabsali
Available Online 30 January 2023.
DOI
10.2991/978-94-6463-110-4_10How to use a DOI?
Keywords
Wireshark tool; Syn flood attack; Vmware; Hping3
Abstract

Due to the popularity of using the technology, network security plays a crucial role recently which supports to establish strong systems that work against cyberattacks. Furthermore, the term “network vulnerabilities” refers to the flaws in the network which attackers exploit to break security and steal critical data. To discover the weaknesses of the network, the attackers use the mechanism of open port scanning to reach the systems and data, therefore the administrator should configure the network correctly and close any open ports. Monitoring network traffic is very important, so the developer focus to design analyzing tools that employ to inspect transmitted packets over the network to trace anomalous activities. Wireshark is one of the most well-known packets analyzing tool that is used to monitor the packets as well as used for examining the protocols. Moreover, the type of attack can be determined from the statistic report which generated by Wireshark tool. For instance, if the attacker sends syn packets to a target device, Wireshark will show the detail of syn packets. Practically, when tcp syn requests are flooded to any device, there will be a huge impact on the device’s resources like consuming the bandwidth which affects system performance at the end. This paper presents a penetration test to lunch syn flood attack by sending a huge number of syn packets from Kali Linux machine to three targeted machines which are Windows 8.1, Windows 10 and Metasploitable. The test includes three scenarios, the first one focus on flooding syn packets by using the real source ip address of the attacker machine while the second scenario relays on sending syn packets by utilizing a spoof source ip address. The final scenario depends on using a random source ip address to flood syn packets. The Wireshark tool will be run in Kali machine to capture the packets and generate detailed reports. The results of captured data will be recorded to make analysis and list the capabilities of this tool.

Copyright
© 2023 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the 1st International Conference on Innovation in Information Technology and Business (ICIITB 2022)
Series
Advances in Computer Science Research
Publication Date
30 January 2023
ISBN
978-94-6463-110-4
ISSN
2352-538X
DOI
10.2991/978-94-6463-110-4_10How to use a DOI?
Copyright
© 2023 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Nawal A. L. Mabsali
AU  - Hothefa Jassim
AU  - Joseph Mani
PY  - 2023
DA  - 2023/01/30
TI  - Effectiveness of Wireshark Tool for Detecting Attacks and Vulnerabilities in Network Traffic
BT  - Proceedings of the 1st International Conference on Innovation in Information Technology and Business (ICIITB 2022)
PB  - Atlantis Press
SP  - 114
EP  - 135
SN  - 2352-538X
UR  - https://doi.org/10.2991/978-94-6463-110-4_10
DO  - 10.2991/978-94-6463-110-4_10
ID  - Mabsali2023
ER  -