Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login/Sign up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    Network Monitoring and Analysis with Wireshark

    Abstract

    The aim of Network Monitoring and Analysis with Wireshark is essential for maintaining the efficiency and security of modern enterprise networks. This project explores the application of Wireshark, a widely used network protocol analyzer, in analyzing network traffic based on protocols, enterprise applications. The project focuses on practical methodologies to demonstrate the effectiveness of Wireshark in these domains. Firstly, the project discusses the methodology for Evaluating network traffic based on various protocols using Wireshark. It highlights the capabilities of Wireshark in capturing and dissecting packets, examining protocols such as IPv4 & IPv6, ARP, TCP, UDP and HTTP to identify performance security threats, and anomalies. Secondly, the project explores the use of Detecting Network Attacks with Wireshark. One of its key capabilities is detecting network attacks by identifying suspicious network traffic patterns. Among various types of network attacks, port scanning is a common method used by attackers to find open ports on a network. This guide will provide an introduction to detecting port scanning using Wireshark. This project demonstrates the versatility of Wireshark as a powerful tool for network administrators and engineers in managing and optimizing network performance, ensuring application reliability.

    Reviewer Photo

    Archit Joshi Reviewer

    badge Review Request Accepted
    Reviewer Photo

    Archit Joshi Reviewer

    04 Oct 2024 02:15 PM

    badge Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Relevance and Originality

    The project addresses a critical area in cybersecurity and network management, focusing on the practical application of Wireshark for monitoring and analyzing network traffic. This relevance is underscored by the growing importance of network security in enterprise environments. The originality of the work lies in its hands-on approach to using Wireshark, highlighting not just theoretical aspects but also practical methodologies. To enhance originality, the authors could explore novel use cases or integrations with other tools to demonstrate Wireshark's unique capabilities.


    Methodology

    The project outlines a solid methodology for evaluating network traffic using Wireshark, detailing how various protocols are analyzed. However, it would benefit from a more structured presentation of the methodologies used. Clearly defining the steps taken to capture and analyze data, as well as any parameters set during the analysis, would add rigor. Including examples of specific scenarios or case studies where these methodologies have been applied successfully would further strengthen this section.


    Validity & Reliability

    While the project emphasizes Wireshark's capabilities, empirical data supporting its effectiveness in real-world applications would enhance the validity of the findings. Presenting case studies or statistical data on the accuracy of detection methods would provide a more reliable basis for claims. Additionally, addressing potential limitations or challenges faced when using Wireshark, such as false positives in attack detection, would create a more balanced view of its applicability.


    Clarity and Structure

    The overall clarity of the project is satisfactory, but the structure could be improved. Organizing the content into distinct sections such as "Introduction," "Methodology," "Results," and "Discussion" would facilitate easier navigation and understanding. The use of clear headings and subheadings would help guide the reader through the various aspects of network monitoring and attack detection. Visual aids, such as diagrams or flowcharts, could further enhance comprehension of complex processes.


    Result Analysis

    The analysis of Wireshark's capabilities in detecting network attacks, specifically port scanning, is an important aspect of the project. However, it would be beneficial to provide more detailed results from actual use cases, including metrics such as detection rates and response times. Discussing the implications of these findings for network administrators and the broader context of cybersecurity would enrich the conclusion. Recommendations for future research or potential improvements in monitoring techniques would also be valuable contributions to the field.

    Publisher Logo

    IJ Publication Publisher

    Thank You Sir

    Publisher

    IJ Publication

    IJ Publication

    Reviewer

    Archit

    Archit Joshi

    More Detail

    Category Icon

    Paper Category

    Computer Engineering

    Journal Icon

    Journal Name

    IJRAR - International Journal of Research and Analytical Reviews External Link

    Info Icon

    p-ISSN

    2349-5138

    Info Icon

    e-ISSN

    2348-1269

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp