skip to main content
article

A Taxonomy of free Network Sniffers for teaching and research

Published:01 October 2005Publication History
Skip Abstract Section

Abstract

Today's networking environment has become very complex. Networks have been growing in size rapidly and have come to support more complex applications. As result, troubleshooting and maintaining networks has become cumbersome and has created the need for new specialized tools such as Network Protocol Analyzers, better known as "Network Sniffers".Network Sniffers have become critical tools in today's networking management and troubleshooting processes. They enable network managers to evaluate and examine the data running through their network by troubleshooting network performance problems and identifying certain network faults. Network Sniffers can help identify network attacks and detect security threats; they can be used in intrusion detection systems.Besides their usage in the technical environment, network sniffers can be used for educational and research purposes. They can be used to help understand packets' architecture and traffic patterns generated by common network applications. Network Sniffers can also be used to evaluate protocol performance and assist in protocol development. Despite their usefulness, network sniffers can be harmful when used by hackers. With network sniffers, hackers can capture data and steal information from targeted networks.This study consists of two major efforts. The first major effort entails researching and determining a set of criteria to use in evaluating and comparing network sniffers. The second major effort involves using the criteria to evaluate and compare three free network sniffers, thus building a taxonomy. The three free network sniffers used in this study were Ethereal, EtherSnoop and Packetyzer. Each of these three sniffers was evaluated and tested. Then their features and capabilities were compared.

References

  1. Daniel Magers, (May 9, 2002), "Packet Sniffing: An Integral Part of Network Defense", Retrieved on September 10, 2004 from http://www.giac.org/practical/Daniel_Magers_GSEC.docGoogle ScholarGoogle Scholar
  2. Roger E. Grimes, (July, 2004), "6 Network Protocol Analyzers", Retrieved on September 10, 2004 from http://www.winntmag.com/Windows/Article/ArticleID/42922/42922.htmlGoogle ScholarGoogle Scholar
  3. Alan Joch, (July 23, 2001), "Network Sniffers", Retrieved on September 10, 2004 from http://www.computerworld.com/networkingtopics/networking/lanwan/story/0,10801,62390,00.htmlGoogle ScholarGoogle Scholar
  4. Ethereal Website, http://www.ethereal.comGoogle ScholarGoogle Scholar
  5. EtherSnoop Website, http://www.arechisoft.com/Google ScholarGoogle Scholar
  6. Packetyzer Website, http://www.packetyzer.comGoogle ScholarGoogle Scholar

Index Terms

  1. A Taxonomy of free Network Sniffers for teaching and research

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Journal of Computing Sciences in Colleges
        Journal of Computing Sciences in Colleges  Volume 21, Issue 1
        October 2005
        267 pages
        ISSN:1937-4771
        EISSN:1937-4763
        Issue’s Table of Contents

        Publisher

        Consortium for Computing Sciences in Colleges

        Evansville, IN, United States

        Publication History

        • Published: 1 October 2005
        Published in jcsc Volume 21, Issue 1

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader