Analysing the Behaviour of Network Traffic Using Pcap in Different Conditions
P. N Venkata Sai1, S. P Chokkalingam2
1P.N Venkata Sai, UG Student, Department of CSE, Saveetha School of Engineering, SIMATS, Chennai (Tamil Nadu), India.
2SP Chokkalingam, Professor, Department of CSE, Saveetha School of Engineering, SIMATS, Chennai (Tamil Nadu), India.
Manuscript received on 29 May 2019 | Revised Manuscript received on 11 June 2019 | Manuscript Published on 22 June 2019 | PP: 538-541 | Volume-8 Issue-3S, February 2019 | Retrieval Number: C11150283S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Considering the previous five decades, computer networks have kept up developing in intricacy and, generally, in number of its clients just as in a lasting development. Henceforth the measure of system traffic streaming over their hubs has expanded radically. With the advancement and promotion of system Technology, administration, the management, and checking of the system are important to keep the system smooth and improve Economic effectiveness. For this reason, the packet sniffer is utilized. Packet sniffing is essential in system observing to investigate and to log network. Packet sniffers are valuable for investigating system traffic over wired or remote systems. Packet sniffers are helpful for both wired and remote systems. This Model centers around the principles of Packet sniffer, it’s working Principle in network which utilized for investigation of Network traffic for its suspicious trails over the network for further analysis to avoid compromising the network clients with attacks like MITM, ARP spoofing and DNS spoofing to make the network less prone to attacks in turn increasing the network security.
Keywords: Traffic Analysis, Packet Capture, Network Analyzer, Pcap Lib, Network Monitoring, Packet Sniffer.
Scope of the Article: Network Operations & Management