Packet Sniffer – A Comparative Characteristic Evaluation Study

  title={Packet Sniffer – A Comparative Characteristic Evaluation Study},
  author={O. Awodele and Otusile Oluwabukola and C. Ogbonna and A. Ajayi},
  • O. Awodele, Otusile Oluwabukola, +1 author A. Ajayi
  • Published 2015
  • Computer Science
  • As network continue to grow it is increasingly important that network administrators are aware of the different types of traffic that is traversing their networks as well as provides sufficient means for decision making process. Traffic monitoring and analysis is essential in order to more effectively troubleshoot and resolve issues when they occur, so as not to bring network services to a stand still for extended periods of time. Numerous tools are available to help administrators with the… CONTINUE READING
    7 Citations
    CheesePi: Delay Characterization through TCP-based Analysis from End-to-End Monitoring
    • 3
    • PDF
    Identifying users by network traffic metadata
    Ethical Network Surveillance using Packet Sniffing Tools: A Comparative Study
    • 4
    • PDF
    User profiling from network traffic via novel application-level interactions
    • 9
    Software Testing Techniques in IoT
    • 5
    The Current Situation of Insider Threats Detection: An Investigative Review
    • 1


    Bottleneck Analysis of Traffic Monitoring using Wireshark
    • A. Dabir, A. Matrawy
    • Computer Science
    • 2007 Innovations in Information Technologies (IIT)
    • 2007
    • 38
    Technology Corner: Internet Packet Sniffers
    • 3
    • PDF
    Based on the network sniffer implement network monitoring
    • B. Yu
    • Computer Science
    • 2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
    • 2010
    • 8
    Analysis of Packet Sniffers – TCPdump VS Ngrep VS Snoop
    • International Journal of Computer Science & Communication, 8(3).
    • 2006
    In Wikipedia
    • Retrieved from
    • 2014
    In Wikipedia
    • Retrieved from
    • 2014
    Overview of TcpDump
    • Retrieved from
    • 2009