Effective Network Monitoring Application for Security |
( Volume 9 Issue 7,July 2022 ) OPEN ACCESS |
Author(s): |
Prasanna Phanindran S, Srivathsan G, Ananthi N, Surender Rangaraju |
Keywords: |
Network, Network Monitoring, Network Monitoring Application, Security, Standalone Networking Application. |
Abstract: |
Although this Technologically-driven world, creates more opportunities and offers state-of-the-art features, it certainly has its downsides. The downsides of this world are cyber threats, especially networking and spoofing threats. These cyber threats lead to reconnaissance, enumeration of a target device, and major security breaches. These networking-based threats include spying on the target to obtain crucial information. This spying is done by having a direct connection with the target system. Usually, this connection is offline and offline connections can be spotted by the target user, but the target user can't determine the offline connection to be an unauthorized source. Spoofing threats not only involve listening to crucial information but, also using the obtained information to spoof a user. Spoofing includes man-in-the-middle attacks in which the hacker acts as a trusted source to the communicating systems. The use of a VPN is generally a solution to spoofing threats but, using a VPN affects the speed of the internet connection. An unstable internet connection may result in a loss of information. Although the market offers various kinds of features, there exists no standalone application to solve these issues. The objective of this research is to develop an efficient, simple, and standalone networking application to aid the user by improving the security. |
Paper Statistics: |
Cite this Article: |
Click here to get all Styles of Citation using DOI of the article. |