Network security tools play an important role in cybersecurity. The document discusses various network security tools including vulnerability scanners like Nessus, packet sniffers like Wireshark, password crackers like John the Ripper, honeypots, and wireless security tools like NetStumbler. It provides an overview of the most popular tools, how they work, and what features they provide to enhance network security through activities like vulnerability detection, packet analysis, password cracking, and monitoring of network traffic. The top five tools discussed are Wireshark, Nessus, Snort, John the Ripper, and NetStumbler.
Physical and logical access controls - A pre-requsite for Internal ControlsBharath Rao
Â
Internal Controls truly forms an integral part for the efficient functioning in any business. The use of information technology to operate business is picking up rapid pace.
Physical and Logical Access Controls are the two areas to begin implementing internal controls. The objective of all IT related Internal controls is to protect confidentiality, integrity and availability of Data.
This presentation was jointly presented by Tarish Vasant (tarishvasant@gmail.com) and myself (Bharath Rao, mailme@bharathraob.com) at the National Conclave held at Udupi on 6th January conducted by the Board of Studies of the Institute of Chartered Accountants of India and the Udupi Branch of SIRC of ICAI.
Physical and logical access controls - A pre-requsite for Internal ControlsBharath Rao
Â
Internal Controls truly forms an integral part for the efficient functioning in any business. The use of information technology to operate business is picking up rapid pace.
Physical and Logical Access Controls are the two areas to begin implementing internal controls. The objective of all IT related Internal controls is to protect confidentiality, integrity and availability of Data.
This presentation was jointly presented by Tarish Vasant (tarishvasant@gmail.com) and myself (Bharath Rao, mailme@bharathraob.com) at the National Conclave held at Udupi on 6th January conducted by the Board of Studies of the Institute of Chartered Accountants of India and the Udupi Branch of SIRC of ICAI.
security concepts ,goals of computer security , problem and requirements ,identifying the assets ,identifying the threats, identifying the impacts, vulnerability ,user authentication ,security system and facilities ,system access control , password management ,privileged user management ,user account management ,data resource protection, sensitive system protection ,cryptography ,intrusion detection ,computer-security classification
Become Wireshark Certified - https://www.udemy.com/wireshark-tutorial/?couponCode=CEWS Understand Wireshark and how this network analyzer tool can help you succeed in your Wireshark job!
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...Criminal IP
Â
Businesses and organizations have numerous network devices, databases, servers, applications, and domains, and all of these IT assets are through IP addresses and Ports.
Attack Surface Management refers to the proactive detection and management of attack vectors such as open ports, server vulnerabilities, similar domains, phishing, and domains distributing malicious code.
Criminal IP ASM automatically monitors and generates a report on assets exposed to the attack surface.
All IT assets are thoroughly detected globally, with a streamlined introduction procedure requiring registration of only one primary domain.
Request a FREE Demo of Criminal IP ASM at:
https://www.criminalip.io/asm/attack-surface-management
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
A VPN (Virtual Private Network) extends a private network across a public network, such as the
Internet.
A VPN is a network that uses a public telecommunication infrastructure, such as the Internet, to provide
remote offices or individual users with secure access to their organization's network. A VPN ensures
privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol
(L2TP). Data is encrypted at the sending end and decrypted at the receiving end.
Presented by Paul Wilson, Director General of APNIC and Chair of APrIGF Multistakeholder Steering Group at the Asia Pacific Internet Leadership Program as part of 2016 APrIGF Taipei
Firco Trust is a customer and entity screening solution that combines filtering intelligence with high performance processing capabilities. With Firco Trust, users can implement Know Your Customers (KYC) programs by filtering existing and new customers, counterparts or beneficiaries against any sanctions, PEPs or negative news list in batch, real-time or on-demand.
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsCSCJournals
Â
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. This system is designed to detect and combat some common attacks on network systems. It follows the signature based IDs methodology for ascertaining attacks. A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats. It has been implemented in VC++. In this system the attack log displays the list of attacks to the administrator for evasive action. This system works as an alert device in the event of attacks directed towards an entire network.
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
Â
This paper is on the exploration of Internet Network security. With the advent of the internet, security became a major concern for computer users, organizations and the Military. The internet structure itself allow for many security threats to occur. Knowing the attack methods, the architecture of the internet when modified can reduce the possible attacks that can be sent across the network. The internet can be secured by the means of VPN, IPSec, AntiâMalware Software and scanners, Secure Socket Layer, intrusionâdetection, security management, firewalls and cryptography mechanisms. The essence of this research is to forecast the future of internet network security.
security concepts ,goals of computer security , problem and requirements ,identifying the assets ,identifying the threats, identifying the impacts, vulnerability ,user authentication ,security system and facilities ,system access control , password management ,privileged user management ,user account management ,data resource protection, sensitive system protection ,cryptography ,intrusion detection ,computer-security classification
Become Wireshark Certified - https://www.udemy.com/wireshark-tutorial/?couponCode=CEWS Understand Wireshark and how this network analyzer tool can help you succeed in your Wireshark job!
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...Criminal IP
Â
Businesses and organizations have numerous network devices, databases, servers, applications, and domains, and all of these IT assets are through IP addresses and Ports.
Attack Surface Management refers to the proactive detection and management of attack vectors such as open ports, server vulnerabilities, similar domains, phishing, and domains distributing malicious code.
Criminal IP ASM automatically monitors and generates a report on assets exposed to the attack surface.
All IT assets are thoroughly detected globally, with a streamlined introduction procedure requiring registration of only one primary domain.
Request a FREE Demo of Criminal IP ASM at:
https://www.criminalip.io/asm/attack-surface-management
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
A VPN (Virtual Private Network) extends a private network across a public network, such as the
Internet.
A VPN is a network that uses a public telecommunication infrastructure, such as the Internet, to provide
remote offices or individual users with secure access to their organization's network. A VPN ensures
privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol
(L2TP). Data is encrypted at the sending end and decrypted at the receiving end.
Presented by Paul Wilson, Director General of APNIC and Chair of APrIGF Multistakeholder Steering Group at the Asia Pacific Internet Leadership Program as part of 2016 APrIGF Taipei
Firco Trust is a customer and entity screening solution that combines filtering intelligence with high performance processing capabilities. With Firco Trust, users can implement Know Your Customers (KYC) programs by filtering existing and new customers, counterparts or beneficiaries against any sanctions, PEPs or negative news list in batch, real-time or on-demand.
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsCSCJournals
Â
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. This system is designed to detect and combat some common attacks on network systems. It follows the signature based IDs methodology for ascertaining attacks. A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats. It has been implemented in VC++. In this system the attack log displays the list of attacks to the administrator for evasive action. This system works as an alert device in the event of attacks directed towards an entire network.
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
Â
This paper is on the exploration of Internet Network security. With the advent of the internet, security became a major concern for computer users, organizations and the Military. The internet structure itself allow for many security threats to occur. Knowing the attack methods, the architecture of the internet when modified can reduce the possible attacks that can be sent across the network. The internet can be secured by the means of VPN, IPSec, AntiâMalware Software and scanners, Secure Socket Layer, intrusionâdetection, security management, firewalls and cryptography mechanisms. The essence of this research is to forecast the future of internet network security.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Module 3 Lectures 6 hrs.
Infrastructure and Network Security: Introduction to System Security, Server Security,
OS Security, Physical Security, Introduction to Networks, Network packet Sniffing,
Network Design Simulation. DOS/DDOS attacks. Asset Management and Audits,
Vulnerabilities and Attacks. Intrusion detection and Prevention Techniques, Host based
Intrusion prevention Systems, Security Information Management, Network Session
Analysis, System Integrity Validation.
Open Source/ Free/ Trial Tools: DOS Attacks, DDOS attacks, Wireshark, Cain & abel,
iptables/
Windows Firewall, snort, suricata, fail2ban
Network Forensics is scientifically proven technique to accumulate, perceive, identify, examine, associate, analyse and document digital evidence from multiple systems for the purpose of uncovering the fact of attacks and other problem incident as well as performing the action to recover from the attack. Many systems are proposed for designing the network forensic systems. In this paper we have prepared comparative analysis of various models based on different techniques.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancement in network security with security protocolseSAT Journals
Â
Abstract Network security is a wider term used habitually to be an eternal security medium to the broadcasting environment. Cryptography, Authentication and access control Mechanisms play a vital role in secure communication over the network. The computer network is a collection of network that shares information across wired or wireless technology. In order to transfer data in a protected and confidential manner there are several security measures available. Network security can also be referred to as network safety. Network security is used to prevent the attacks by using protocols during the communication of data. This paper describes the several types of attacks, threats and protocols which attempts the secure communication between client and server. Keywords: - DSA, DDOS, HTTPS, RADIUS, VPN, IPSEC etcâŚ
Network sniffers & injection tools
Network Threats Attack
Specific Attack Types
Network Sniffer
How does a Sniffer Work?
How can I detect a packet sniffer?
Packet Sniffer Mitigation
Injection Tools
Team research paper and project on network vulnerabilities with multiple attacks and defesnses:
Cybersecurity
-For this project, our class was paired with teams to attempt to find vulnerabilities in other teams networks and to successfully beach their network.
-My role in this group was to help breach other team vulnerabilities through different attacks like responder attacks, honeypots, etc.
-The main challenges of this project were trying to find the vulnerabilities successfully, as the whole team had troubles with each of our different attacks and defenses.
-We learned how to use cybersecurity tools to help find vulnerabilities in networks and how to protect against them better. For example, in the honeypot we used we deployed it to port 80, when the attacker tried to access our fake server we were notified. We also deployed palto alto firewall to create our private and secure network. For an attack, we also used password crackers like john the ripper. This project taught us how to breach networks as a team.
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSIJCNCJournal
Â
Sniffing is one of the most prominent causes for most of the attacks in the digitized computing environment. Through various packet analyzers or sniffers available free of cost, the network packets can be captured and analyzed. The sensitive information of the victim like user credentials, passwords, a PIN which is of more considerable interest to the assailantsâ can be stolen through sniffers. This is the primary reason for most of the variations of DDoS attacks in the network from a variety of its catalog of attacks. An effective and trusted framework for detecting and preventing these sniffing has greater significance in todayâs computing. A counter hack method to avoid data theft is to encrypt sensitive information. This paper provides an analysis of the most prominent sniffing attacks. Moreover, this is one of the most important strides to guarantee system security. Also, a Lattice structure has been derived to prove that sniffing is the prominent activity for DoS or DDoS attacks.
In modern world, our entire life moves around Computers. Most of our tasks are dependent on
the Computers, like Communication, Ticket Reservations, Researches, Printing, and Education
etc. When we communicate with each other by using Computers through E Mails, a number of
Computers are used for this purpose and the collection of these computers forms a network,
which is called a Computer Network. As more and more peoples are going to be connected
through the general network (INTERNET), the problem of security arises. Now a day, a number
of security issues occur in networks which include Sniffing, Spoofing, Security Attacks,
Malwares, Unauthorized Access, etc. This will create havoc for the users, who wants to
communicate with each other through these networks. So, to make the communication between
two users via the Computer Networks, we have to follow some security measures, which include
using the Firewalls, Anti Malicious Software, Intrusion Detection Systems, Cryptography
Techniques, etc. This paper is basically focused on how the communication between two users
has been performed by using Computer Networks and how to make such a communication
Similar to A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS (20)
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Â
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
⢠The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
⢠The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate âany matterâ at âany timeâ under House Rule X.
⢠The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
Â
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Â
Francesca Gottschalk from the OECDâs Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
How to Make a Field invisible in Odoo 17Celine George
Â
It is possible to hide or invisible some fields in odoo. Commonly using âinvisibleâ attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Â
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Hanâs Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insiderâs LMA Course, this piece examines the courseâs effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Â
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Introduction to AI for Nonprofits with Tapp Network
Â
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
1. DOI:10.21884/IJMTER.2018.5155.6NNKW 156
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
Rajatha1
and Chaitra Acharya2
1,2
Department of Information Science, SCEM
AbstractâAdvancements in technology have facilitated the growth of different cyber attacks. The
number of hackers is increasing exponentially. By 2019, cyber crime costs may reach up to $2.1
trillion. Security is a very important aspect for computers to have in todayâs world. Therefore it is
very important to provide Network Security to safeguard the availability, confidentiality, and
integrity of the data irrespective of our business. Network security addresses a wide range of threats
and the associated attacks. In this paper, we analyze how network security works and a brief
overview of the various tools that are required to detect and handle the attacks generated from the
various threats.
Keywords â Network Security, Wireshark, Nessus, Snort, John the Ripper, NetStumbler.
I. INTRODUCTION
Network Security is a set of activities designed to protect our network. It consists of the
policies and procedures designed to prevent and protect systems from various active and passive
attacks like unauthorized access, modification, misuse, eavesdropping, phishing, spoofing, malware
and other such attacks. Network security has the following basic characteristics:
1. Data Integrity: It assures that the information cannot be modified by unauthorized entities.
2. Data Confidentiality: It assures that the private and confidential information is not disclosed
to unauthorized entities.
3. Data Availability: It assures the timely and reliable access of data to the authorized users [2].
Network Security begins with authentication of users with username and password. Since it
deals with one user, it is also termed as One-factor authentication. Two-factor authentication has user
entering password along with extra security factor like an OTP or a pin. Similarly three-factor
authentication has an extra security feature like biometric verification along with the security
features of two-factor authentication. Once authentication is done, intruders are detected and
prevented through firewalls and intrusion detection and prevention systems like honeypots and
honeynets.
Networks are often attacked by malicious sources. The attacks are of two basic types: active
and passive. While passive attacks include snooping, eavesdropping, scanning and traffic analysis;
the active attacks include much more. The most popular and common attacks are DOS(Denial-of-
Service),Man-in-the-middle,spoofing,phishing,malware and much more [1]. To prevent these attacks
we need network security tools which safeguard our systems and thereby prevent loss or
modification of data. Network security tools include packet sniffers, port scanners, vulnerability
scanners, brute-force password crackers, debugging and exploration tools, WEP and WPA crackers
and network intrusion detectors.
II. TYPES OF NETWORK SECURITY TOOLS
2.1. Vulnerability scanners
A Vulnerability scanner is a computer program designed to scan computer systems, networks
and applications for highly detailed information in order to determine security holes and weaknesses.
2. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume: 5, Issue: 05, [Mayâ 2018] ISSN (Online):2349â9745 ; ISSN (Print):2393-8161
@IJMTER-2018, All rights Reserved 157
It identifies and detects the vulnerabilities that reside on network-based assets like firewalls, routers,
servers and so on. There are various types of vulnerability scanners like port scanners, network
vulnerability scanners, host based vulnerability scanners, database security scanners, web-application
security scanners, ERP security scanners and single vulnerability tests [1]. The most popular
vulnerability scanner tool is Nessus developed by Tenable Network Security. It is open-source
software available for personal use. It allows for scanning of the following vulnerabilities such as
misconfiguration, DOS, security holes, invalid mangled packets.
2.2. Packet Sniffers
A packet sniffer also called as network protocol analyzer, is a network tool that intercepts
packets from the network and analyzes them. It provides the necessary information to the network
technicians to diagnose and solve network- related issues [3]. Contrarily, it can also be used by the
hackers to eavesdrop on the network activities or to analyze the pattern of the packets to decode the
passwords. Packet sniffers intercept and logs into network traffic to keep tab on the activities through
wired or wireless network interfaces. [1] As the data stream flows through the network, sniffers
captures each of these packets to decode and analyze it and further presents it in the human readable
format to facilitate the person using packet sniffing to view and understand the details.
Packet sniffers are available in both commercial and open-source forms. The popular
commercial sniffers are: Sniffers and packet analyzers. Sniffer is a commercial tool used to monitors
the data travelling over the network. Packet analyzer, holds an essential part in Network management
toolkit, is a tool to trace and capture files, and then decodes them into the component parts. Open
source sniffers include Wireshark and Snort.
2.3. Password crackers
Password crackers also known as password hackers are the tools used to identify the
unknown or the forgotten password. It also helps the human hackers to obtain the forbidden and
unauthorized access to the resources. [1] Password crackers use two methods to crack the passwords:
brute force and dictionary searches. Brute force cracking is a technique in which the hacker runs
through the various combinations of password and passphrases, until the correct ones are found.
Whereas, in dictionary search, the hacker searches each words in the dictionary entries to find the
correct password.
Most popularly known password cracker is John the ripper.
2.4. Honeypots
Honeypots belong to the class of powerful security tools designed to lure attackers and to trap
and divert them away from the potential critical systems. They are also known as decoys, lures and
flytraps [1]. Honeypot systems do the following activities:
a) Divert attackers from the critical systems.
b) og the activities of attackers and alert administrators to respond to the attacks.
A collection of honeypots on a network is referred to as a Honeynet.
Honeypots can be classified as:
a) Pure Honeypots- use bug tap to monitor attacker activity.
b) High-interaction Honeypots- imitates the system services making attacker waste his time.
c) Low-interaction Honeypots- imitates only the services requested by the attacker.
2.5. Wireless Security tools
Wireless networks are at higher risk of attack as compared to wired networks [5]. So wireless
network security is more challenging than wired network security. A wireless security tool should be
capable of sniffing traffic, scan wireless hosts and check the level of privacy and confidentiality
provided on the network. Some of the popular wireless security tools are Aircrack, NetStumbler,
Kismet and inSSIDer.
3. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume: 5, Issue: 05, [Mayâ 2018] ISSN (Online):2349â9745 ; ISSN (Print):2393-8161
@IJMTER-2018, All rights Reserved 158
III. POPULAR NETWORK SECURITY TOOLS
Network security tools play an important role in cyber security. The top 5 security tools
currently in the market are given below:
3.1. Wireshark
Wireshark also known as ethereal is the most widely used network protocol analyzer or a
packet sniffer.[4] It is similar to tcpdump and has additional graphical user interface with sorting and
filtering options. It contains the following features:
a) Analyzes both captured data packets and packets being transmitted over the network.
b) Supports data reading and analysis for various range of networks.
c) A graphical user interface which makes it easier for the user to differentiate the packets.
d) An organized data display of the captured filtered packets.
Figure 1. Wireshark
3.2. Nessus
Nessus is the worldâs most popular, open-source vulnerability scanner developed by Tenable
Network Security [4]. It uses Nessus Attack Scripting Language (NASL) to describe individual
threats and potential attacks. Nessus consists of two main components: Nessusd, which scans
networks and Nessus, which gives results to the user. The characteristics of Nessus include:
a) Nessus is compatible with all computers and servers.
b) Detects security holes in both remote and local hosts.
c) Detects security updates and also the patches for the bugs.
d) Simulates attacks to find the vulnerabilities in a system.
e) Schedules and executes the security audits.
4. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume: 5, Issue: 05, [Mayâ 2018] ISSN (Online):2349â9745 ; ISSN (Print):2393-8161
@IJMTER-2018, All rights Reserved 159
Figure 2. Nessus
3.3. Snort
Snort is an open-source network intrusion detection and prevention system. It performs real-
time traffic analysis and packet logging on IP networks [3]. The different modes in which snort
operates are:
a) Sniffer
b) Packet logger
c) Network intrusion detection
In sniffer mode, the program reads the network packets and displays to the user. In packet-
logger mode, it logs packets to the disk. In intrusion detection mode, it will monitor the network
traffic and analyze it. The characteristics of Snort include:
i) Content searching and matching.
ii) Detects varieties of attackers.
iii) Protocol analysis
iv) Sends real-time alert to syslog- a separate alert file.
Figure 3. Snort
5. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume: 5, Issue: 05, [Mayâ 2018] ISSN (Online):2349â9745 ; ISSN (Print):2393-8161
@IJMTER-2018, All rights Reserved 160
3.4. John the ripper
It is a password-cracking software tool. It is the most popular password cracker as it
combines various password crackers into a package [3]. It is compatible with various platforms. John
the ripper is an open-source, free password cracking tool which offers both brute force and dictionary
attack modes. In brute force mode, it scans all the possible texts and hashing each one of them and
then compares it with the input hash. In dictionary attack mode, it takes string samples, usually made
up of wordlist found in dictionary, encrypts them in the exact format the way the password being
examined has been encrypted, and then compares the output to the encrypted string.
Figure 4.John the Ripper
3.5. NetStumbler
NetStumbler also known as Network Stumbler is a Windows based tool that detects Wireless
LANâs using 802.11a, 802.11b and 802.11g wireless LAN standards. NetStumbler is most helpful in
gathering details of wireless networks, followed by configuring, securing and optimizing the
networks [4]. NetStumbler supports the following scripting languages like
VBScript,Perlscript,Jscript and Python.
The characteristics of NetStumbler include:
i) Wardriving which detects WiFi wireless networks while driving.
ii) Verifying network configurations.
iii) Finding locations having poor coverage.
iv) Detecting access points which are unauthorized.
v) Detecting the wireless interference causes.
Figure 5.NetStumbler
6. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume: 5, Issue: 05, [Mayâ 2018] ISSN (Online):2349â9745 ; ISSN (Print):2393-8161
@IJMTER-2018, All rights Reserved 161
IV. CONCLUSION
Network security tools are a necessity in todayâs world of attackers and intruders .These tools
detect the threats to security as well as system vulnerabilities and alert the administrator to take
preventive measures.This paper deals with the various types of security tools and gives a brief
overview of the most popular tools in security field.
REFERENCES
[1] Amanpreet Kaur and Monika Saluja , âStudy of Network Security along with Network Security Tools and Network
Simulators , â International Journal of Computer Science and Information Technologies,, Vol. 5 (1) , 2014,88-92.
[2] William Stallings, âNetwork Security Essentials:Applications and Standards,âFourth Edition, Pearson
Publication,ISBN 13: 978-0-13-610805-4, 2011.
[3] Michael E. Whittman and Herbert J.Mattord, âPrinciples of Information Security ,â Fourth Edition,Pearson
Publication , ISBN-13: 978-1-111-13821-9, 2012
[4] Toney Bradley, â Insecure.org's Top 125 Network Security Toolsâ , Survey-Driven List of the Best Network
Security Tools, July 2017
[5] Noel network and PC services INC., âThe 4 different types of network security and why do you need themâ, March
2017