International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.10, No.7, Jul. 2018

Ethical Network Surveillance using Packet Sniffing Tools: A Comparative Study

Full Text (PDF, 775KB), PP.12-22

Views:55   Downloads:3


Ibrahim Ali Ibrahim Diyeb, Anwar Saif, Nagi Ali Al-Shaibany

Index Terms

Packet Sniffing Tools;Packet Sniffer;Network Vulnerability;Network Analysis;Wireshark;TCPdump;Colasoft


Nowadays, with growing of computer's networks and Internet, the security of data, systems and applications is becoming a real challenge for network's developers and administrators. An intrusion detection system is the first and reliable technique in the network's security that is based gathering data from computer network. Further, the need for monitoring, auditing and analysis tools of data traffic is becoming an important factor to increase an overall system and network security by avoiding external attackers and monitoring abuse of the IT assets by employees in the workplace. The techniques that used for collecting and converting data to a readable format are called packet sniffing. Packet Sniffer is a tool that used to capture packets in binary format, converts that binary data into a readable data format and log of that captured data for analyzing and monitoring, displaying different used applications, clear-text user names, passwords, and other vulnerabilities. It is used by network administrator to keep the network is more secured, safe and to support better decision. There are many different sniffing tools for monitoring, analyzing, and reporting the network's traffic. In this paper we will compare between three different sniffing tools; TCPDump, Wireshark, and Colasoft according to various parameters such as their detection ability, filtering, availability, supported operating system, open source, GUI, their characteristics and features, qualitative and quantitative parameters. In addition, this paper may be considered as an insight for the new researchers to guide them to an overview, essentials, and understanding of the packet sniffing techniques and their working.

Cite This Paper

Ibrahim Ali Ibrahim Diyeb, Anwar Saif, Nagi Ali Al-Shaibany,"Ethical Network Surveillance using Packet Sniffing Tools: A Comparative Study", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.7, pp.12-22, 2018.DOI: 10.5815/ijcnis.2018.07.02


[1]Nedhal A. Ben-Eid, Ethical Network Monitoring Using Wireshark and Colasoft Capsa as Sniffing Tools, International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 3, pp 471-478, March 2015.

[2]Palak Girdhar and Vikas Malik, A Study on Detecting Packet Using Sniffing Method, Journal of Network Communications and Emerging Technologies (JNCET) Vol. 6, Issue 7, July, 2016.

[3]Nabanita Mandal and Sonali Jadhav, A Survey on Network Security Tools for Open Source, IEEE, 2016.

[4]Savita Kamalakarrao Kulkarn, A Survey of Password Attacks, Countermeasures and Comparative Analysis of Secure Authentication Methods, IJARCSMS, Vol. 3, Issue 11, ppt. 319-331, November 2015.

[5]Dr. Aruna Varanasi, P. Swathi, Comparative Study of Packet Sniffing tools for HTTP Network Monitoring and Analyzing, IJCSET(, Vol. 6, Issue 12, pp. 406-409, December 2016.

[6]Oludele Awodele, Otusile Oluwabukola, A.C Ogbonna, and Ajayi Adebowale, Packet Sniffer – A Comparative Characteristic Evaluation Study, Proceedings of Informing Science & IT Education Conference (InSITE), pp. 91-100, 2015.

[7]ANSHUL GUPTA, A Research Study on Packet Sniffing Tool TCPDUMP, International Journal of Communication and Computer Technologies, Vol. 01, No. 49 Issue 06, pp. 172-174, July, 2013.

[8]Dr. Charu Gandhi, Gaurav Suri, Rishi P. Golyan, Pupul Saxena and  Bhavya K. Saxena, Packet Sniffer – A Comparative Study, International Journal of Computer Networks and Communications Security, Vol.2, No. 5, ppt. 179–187, May 2014.

[9]Dr. Mahesh Kumar and Rakhi Yadav, TCP & UDP PACKETS ANALYSIS USING WIRESHARK, IJSETR, Vol. 4, Issue 7, ppt. 2470-2474, July 2015.

[10]Ajay Kumar, and Jai Bhagwan Yadav, Comparison: Wireshark on different parameters, International Journal Of Engineering And Computer Science, Vol. 5, Issue 3, ppt. 16041-16046, March 2016.

[11]Pallavi Asrodia and Hemlata Patel, Analysis of Various Packet Sniffing Tools for Network Monitoring and Analysis, International Journal of Electrical, Electronics and Computer Engineering, ppt. 55-58, 2012.

[12]Pallavi Asrodia, Mr. Vishal Sharma, Network Monitoring and Analysis by Packet Sniffing Method, International Journal of Engineering Trends and Technology (IJETT), Vol. 4, Issue. 5, ppt. 2133-2135, May, 2013.

[13]Inderjit Kaur, Harkarandeep Kaur, and Er. Gurjot Singh, Analysing Various Packet Sniffing Tools, International Journal of Electrical Electronics & Computer Science Engineering, Vol. 1, Issue. 5, ppt. 65-69, October 2014.

[14]Mohammed Abdul Qadeer, Mohammad Zahid, Arshad Iqbal and MisbahurRahman Siddiqui, Network Traffic Analysis and Intrusion Detection using Packet Sniffer, Second International Conference on Communication Software and Networks, ppt. 313-317, IEEE, 2010.

[15]Otusile Oluwabukola, Awodele Oludele, A.C Ogbonna, Ajeagbu Chigozirim, and Anyeahie Amarachi, A Packet Sniffer (PSniffer) Application for Network Security in Java, Issues in Informing Science and Information Technology, ppt. 389-400, Vol. 10, 2013.

[16]S.Pavithirakini, D.D.M.M.Bandara, C.N.Gunawardhana,, Improve the Capabilities of Wireshark as a tool for Intrusion Detection in DOS Attacks, International Journal of Scientific and Research Publications, Volume 6, Issue 4, pp. 378-384, April 2016.

[17]Ibrahim Diyeb and Dr. Sharaf A. Alhomdy, Frame Relay versus Asynchronous Transfer Mode: A Comparative Study and Simulation, I. J. Computer Network and Information Security, Volume 10, pp. 33-40, October, 2017.

[18]Shaneel Narayan, Paula Raymond Lutui, TCP/IP Jumbo Frames Network Performance Evaluation on A Testbed Infrastructure, I.J. Wireless and Microwave Technologies, volume 6, pp. 29-36, 2012.

[19]Er. Vikram Jeet Singh, Er. Vikram Kumar, Dr. Kishori Lal Bansa, Research on Application of Perceived QoS Guarantee through Infrastructure Specific Traffic Parameter Optimization, I.J. Computer Network and Information Security, volume 3, 59-65, 2014.

[20]Y. –J. Lee, Mean Response Time Approximation for HTTP Transactions over Transport Protocols, I.J. Computer Network and Information Security, 2015, 1, pp. 24-30.