Explore chapters and articles related to this topic
Network Threats
Published in Nicholas Kolokotronis, Stavros Shiaeles, Cyber-Security Threats, Actors, and Dynamic Mitigation, 2021
Panagiotis Radoglou Grammatikis, Panagiotis Sarigiannidis
A passive network traffic analysis attack includes the capturing and analysis of the network packets exchanged in a network. In particular, this kind of attack requires the attacker to enable the promiscuous mode of the Network Interface Controller (NIC) in order to not ignore those packets that are not destined to the attacking machine. There are many software applications that can be used for implementing this attack, such as Wireshark [18], Tcpdump [19], and Scapy [20]. More specifically, these applications are composed of two main elements called: (a) sniffer and (b) protocol analyzer. The sniffer undertakes to capture and copy the network traffic, while the protocol analyzer decodes, processes, and analyses the various packets.
Delay Jitter Performance Analysis and Traffic Splitting in Cellular-Based Multi-Access System
Published in IETE Technical Review, 2023
Megha Sahu, Arzad Alam Kherani
Figure 6 shows the experimental set-up where we have two end-machines for Sender and Receiver. The sender has N cellular (LTE) modems USB-tethered to it. The receiver has a fixed public IP address. We generate the RTP traffic from the traffic source, which can be a camera for a live feed or a stored video file. For the RTP traffic, at the sender, the source video is played internally to the local port using FFmpeg (video stream handling free software), and simultaneously during this process, we use Python's sniff command of the Scapy library to capture the RTP packets to be sent over the interfaces. These packets are processed by the Interface Manager, which extracts the RTP packets and encapsulates them into well-formed UDP packets while assigning a unique destination port to packets are being sent over an interface. As the video packet sizes vary in the case of RTP thus, for simplicity, we fix each IP packet size to while generating from the FFmpeg.