• Title/Summary/Keyword: Wireshark

Search Result 20, Processing Time 0.034 seconds

Android Network Packet Monitoring & Analysis Using Wireshark and Debookee

  • Song, Mi-Hwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.26-38
    • /
    • 2016
  • Recently, mobile traffic has increased tremendously due to the deployment of smart devices such as smartphones and smart tablets. Android is the world's most powerful mobile platform in smartphone. The Android operating system provide seamless access to many applications and access to the Internet. It would involve network packet sharing communicated over the network. Network packet contains a lot of useful information about network activity that can be used as a description of the general network behaviours. To study what is the behaviours of the network packet, an effective tools such as network packet analyzers software used by network administrators to capture and analyze the network information. In this research, more understanding about network information in live network packet captured from Android smartphone is the target and identify the best network analyzer software.

Traffic Analysis of Smart Phone Mobile Games Characteristics in Smart Phone Environment (스마트폰 환경 하에서 모바일 게임 특성에 따른 트래픽 분석에 관한 연구)

  • Choi, Su-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.407-410
    • /
    • 2013
  • 전 세계적으로 초고속 인터넷이 보급화 되고 대중화 되는 현재 컴퓨터 온라인 게임 산업뿐만 아니라 스마트폰 모바일 게임 산업이 빠르게 성장하면서 고정된 장소에서 게임하는 시대는 가고 이동 중 게임하는 시대가 열렸다. 이와 동시에 모바일 게임 트래픽 또한 점차 증가되고 있는 실정이다. 본 논문은 모바일 게임의 트래픽 분석을 위해 서로 다른 특성의 게임인 애니팡과 드래곤 플라이트를 이용하여 모바일 속도 측정 프로그램인 벤치비로 트래픽 변동 상황을 정리하고 tPacketCapture 프로그램과 네트워크 측정 분석기인 Wireshark로 일정한 시간 간격을 두고 총 패킷의 수와 전송되는 패킷의 크기 등에 대한 체계적인 네트워크 데이터를 분석하여 시간적 제한이 있는 보드 퍼즐 게임의 특성을 지닌 애니팡은 게임 진행상에서 빈번하게 데이터 패킷이 송 수신 되고 시간적 제한이 없는 슛팅 게임의 특성을 지닌 드래곤 플라이트는 게임 시작과 종료 지점에서만 주로 데이터 패킷이 송 수신 된다는 것을 알 수 있었다. 이러한 스마트폰 모바일 게임의 트래픽 분석은 향후 모바일 게임 네트워크의 성능 평가나 다른 모바일 게임의 설계 및 개발 등에 활용 될 수 있을 것이다.

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

  • Desta Dana Data
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.107-114
    • /
    • 2023
  • The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks

A Study on change from an RTU-based substation to IEC 6 1850-based SA substation (RTU 기반 변전소의 IEC 61850 기반 SA 변전소로의 전환에 대한 실증 연구)

  • Yuk, Sim-Bok;Lee, Sung-Hwan;Kim, Chong-il
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.436-444
    • /
    • 2018
  • Currently, the new substation automation uses the international standard IEC 61850 communication protocol. KEPCO is also constructing a new substation based on IEC 61850 from 2013 through the pilot application and research and development starting from 2007. However, there are few cases where existing substations(Transformer, T/L GIS, D/L GIS, etc.) have been used, and RTU based substations operating systems have been changed to SA substations based on IEC 61850. Therefore, the introduction of IEC 61850 in existing substation facilities has the advantage of enhancing the substantiality of the substation by reusing existing facilities, improving the interoperability with the latest substations introduced, and converting existing substations into systems suitable for unmanned operation. In this paper, we introduce a case of changing the existing RTU based substation operation system to digital substation using IEC 61850 field information processor, Ethernet switch and SA operation system. Also, IEC 61850 client authentication program and Wireshark, which is a packet analysis tool, verify IEC 61850 conformance and its feasibility.

IEEE 802.11a Technnical Analysis and Research for Development of Unmanned Vehicle System (무인자동차 시스템 개발을 위한 IEEE 802.11a 기술 분석 및 연구)

  • Kim, Young-Hyuk;Choi, Sang-Wook;Lim, Il-Kwon;Choi, Jeong-Dan;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.108-111
    • /
    • 2009
  • In this paper, the development of unmanned vehicle systems to analysis applicable communications and alternative IEEE 802.11a. IEEE 802.11b/g uses the 2.4GHz. So, using the 5GHz OFDM in IEEE 802.11a interference phenomenon better. IEEE 802.11a has a maximum speed of 54Mbps. Indoors and apartment parking on experiment to soft roaming, hard roaming. Test equipments are AP four units(RSU), reliable results for the AP one unit Bridge, Switch one unit, one server notebook, one notebook(OBU), one car. Use Softwares are Wireshark, Jperf, Ping and million second transfer was used to develop the program. So the actual car was similar to the environment. With the results of the experiment for the unmanned vehicle systems will provide the best method.

  • PDF

A Study on the Operation and Personal Information Management of Public and Private Kindergarten Homepages (공·사립 유치원 홈페이지의 운영 및 개인정보 관리 실태 연구)

  • Kim, Jong Min;Chun, Hui Young;Choi, Eun A
    • Korean Journal of Child Studies
    • /
    • v.37 no.6
    • /
    • pp.119-132
    • /
    • 2016
  • Objective: The purpose of this study was to analyze the operation and personal information management of public and private kindergarten homepages. Methods: A total of 2,846 kindergartens were selected from the I-Sarang portal service for analyzing operation, and 217 self-operating homepages were selected for evaluating management. Seven evaluation items from three domains (information gathering procedures and scope, information security, and management of file exposure protection) were used. Wireshark and Google were used for analyzing some evaluation items. Results: The operating ratio of kindergarten homepages was low and most of the kindergartens self-operated their homepages. The evaluation of the information gathering procedures and scope showed that the rule of consent process was not rigidly followed but that the rule of legality for information gathering was followed. Items related to information security were followed at very low levels. As for the management of file exposure protection, the evaluation of items related to the prevention of attachment disclosure showed that the rule of protecting personal information included in an attached file was followed but that the notice regarding information protection was not. Across all evaluation items, the level of personal information management was higher in public (vs. private) kindergartens. Conclusion: These results indicate methods to more securely and effectively manage personal information on kindergarten homepages.

Flow Mobility of PMIPv6 for Multi-Interface Mobile Nodes (PMIPv6 환경에서 Multi-Interface 단말의 플로우 이동성 지원 방안)

  • Lee, Dong-Min;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10B
    • /
    • pp.1168-1174
    • /
    • 2011
  • The IEFT has recently considered to provide flow mobility for multi-interface MN in the PMIPv6. In this paper, we proposed an extended BCE of the LMA and a novel mechanism for flow mobility of PMIPv6. With our proposal BCE and mechanism, the LMA can route packets by the flow label and hence packet loss during handover can be eliminated. Also, to validate our flow mobility scheme, we designed and implemented the PMIPv6 packet data unit and database of both LMA and MAG, and configured a testbed for flow mobility in PMIPv6. And the support of flow mobility was configured with the network connectivity test in our testbed. According to the Wireshark results, we can see that our proposed scheme works wells for flow mobility in PMIPv6.

Transmission for IEC 61850 Sampled Values Using Current and Voltage Sensors of Raspberry Pi (라즈베리파이 전류와 전압 센서를 이용한 IEC 61850 샘플 값 전송)

  • Hwang, Sung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.157-162
    • /
    • 2018
  • This study uses sensors and Raspberry Pi to measure the values of current and voltage and transmits the measured sampled values to a network, carrying them in the frame of IEC 61850-9-2. A laboratory model was composed to send the sampled values, using the frame of IEC 61850-9-2. This study conducted a protocol analysis, using Wireshark for the accurate verification of the occurrence of the frame of IEC 61850-9-2. A visual analysis was conducted by displaying the received sampled values of current and voltage on the monitor in graphs. In addition, this study tested if the sampled values of IEC 61850-9-2 sent and received through the network equipment would meet the performance requirements of the message types of IEC 61850.

Interpretation and Statistical Analysis of Ethereum Node Discovery Protocol (이더리움 노드 탐색 프로토콜 해석 및 통계 분석)

  • Kim, Jungyeon;Ju, Hongteak
    • KNOM Review
    • /
    • v.24 no.2
    • /
    • pp.48-55
    • /
    • 2021
  • Ethereum is an open software platform based on blockchain technology that enables the construction and distribution of distributed applications. Ethereum uses a fully distributed connection method in which all participating nodes participate in the network with equal authority and rights. Ethereum networks use Kademlia-based node discovery protocols to retrieve and store node information. Ethereum is striving to stabilize the entire network topology by implementing node discovery protocols, but systems for monitoring are insufficient. This paper develops a WireShark dissector that can receive packet information in the Ethereum node discovery process and provides network packet measurement results. It can be used as basic data for the research on network performance improvement and vulnerability by analyzing the Ethereum node discovery process.

A Study of Forensic on Eavesdropping from VoIP and Messenger through WiBro Network (WiBro 네트워크에서 메신저, VoIP 도청 및 포렌식 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.149-156
    • /
    • 2009
  • Korean WiBro becomes international standard to IEEE 802.16e, and We are carrying out a WiBro network business from capital regions. We executed eavesdropping about voices and messenger program and the VoIP which frequently happened in WiBro networks at these papers. We have a lot in common with the Wireshark which is a packet collection and an analyzer, and We execute eavesdropping, and We reproduce eavesdropping data with bases to a SIP, H.263, TCP, UDP protocol through packets. In time of a copy of a packet negative the VoIP which verify time with bases, and was eavesdropped on integrity packet and a X-Lite call record, be matched that a packet is counterfeit forgery did not work, and We demonstrate, and verify integrity. The data which integrity was verified put in a seaming envelope, and we prepare so as it is to a liver of investigator, and execute, and to be able to do use to proof data after seaming in courts in order to utilize as criminal investigation data.