packet sniffing

packet sniffing

Inspecting packets being transmitted in a network. See network analyzer.
References in periodicals archive ?
They took a Raspberry-Pi microcomputer, configured it as an Ethernet adapter, made some additional configuration changes in the OS running on the microcomputer, and installed a few publicly available tools for packet sniffing, data collection and processing.
It mainly consists of five components, namely: Packet Sniffing, Signature based Detection, Anomaly Detection, Alert System and Central Log Database.
The author instructs readers in such methods as extracting information from digital images, timing of digital events, browser searches, IP tracing, port scanning, and packet sniffing.
Packet sniffing, which is the simplest form of intrusion.
Packet sniffing can be done passively because of the hub-based configuration of the APs.
Thus, privacy protections for unsecured Wi-Fi communications can be extended through the Act without compromising legitimate uses of packet sniffing in research and network administration.
This was followed by the ability of the provider to deal with packet sniffing (4).
Secure VPNs use cryptographic tunneling protocols to provide confidentiality by blocking intercepts and packet sniffing, allowing sender authentication to block identity spoofing, and provide message integrity by preventing message alteration.
The fully updated second edition of this guide to packet analysis using the popular network tool Wireshark, provides in-depth information on the theory and concepts of network traffic analysis as well as practical real world examples of packet sniffing in a variety of situations.
Using packet sniffing technology, a malicious intruder can capture sensitive data and compromise network security.
The VPN creates a 'tunnel' in which cryptographic tunneling protocols prevent snooping or packet sniffing, authentication blocks any attempts at identity spoofing and can therefore provide message integrity.
You can have all the content filters and packet sniffing software in place across your network, but if there is someone viewing something he shouldn't be, there is little you can do.