Abstract
In a local network, the act of sniffing has been a big threat. Today, most network users and administrators believe that sniffing is a threat in hub-based networks, but it is no more a threat in switched networks. Because, in a hub-based network, any packet sent to a host will be received by all network's hosts, sniffing can be easily performed. However, in a switched network, any packet sent to a host will be received only by the destination host, unless it is a broadcast packet. Therefore, sniffing seems impossible in switched networks. This article shows that there are several ways that sniffing can be performed in switched networks. The man-in-the-middle (MiM) attack is a key step in the process of preparing a sniffing activity in a switched network.
| Original language | English |
|---|---|
| Pages (from-to) | 51-60 |
| Number of pages | 10 |
| Journal | Information Systems Security |
| Volume | 14 |
| Issue number | 4 |
| DOIs | |
| Publication status | Published - 2005 |
| Externally published | Yes |
ASJC Scopus subject areas
- Software
- Computer Science Applications
- Information Systems and Management
Fingerprint
Dive into the research topics of 'Switched network sniffers detection technique based on IP packet routing'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS