Skip to main content

Posts

Student Ideas

 In my post "Student Ideas", I would like to show more about Wireshark : (Dhamija, Google, 2021) What Is Wireshark and How Does It Work? Wireshark is a packet capture tool that captures packets from a network connection, such as your computer to your home office or the internet. In a typical Ethernet network, a discrete unit of data is referred to as a packet. Wireshark is the world's most popular packet sniffer. Wireshark, like any other packet sniffer, performs three tasks: Packet Capture: Wireshark listens in real-time to a network connection before capturing full traffic streams - potentially tens of thousands of packets at a time. Filtering:  Wireshark can slice and dice all of this random live data using filters. You can access only the information you require by using a filter. Visualisation: Like any decent packet sniffer, Wireshark lets you go right into the centre of network transmission. It also allows you to see whole chats and network feeds in real-time(Co...
Recent posts

Initial Project Plan (Gantt Chart Update)

 Today I finished my research and updated my initial project plan using Gantt Chart.

Academic Paper Summary

 https://ieeexplore.ieee.org/document/9750619 Summary: Since the first worm virus Morris outbreak in 1988, Internet worms have threatened our internet security every day. With the rapid development of the Internet and the increasing complexity of the network, the occurrence frequency of network worms is higher and higher. The network worm virus has become the most widespread and urgent issue to be solved in malicious code research. Researchers study the transmission speed, transmission route, spatial range, and biodynamic mechanism of infectious diseases to guide effective intervention, prevention, and control. According to the transmission mechanism of the virus, infectious disease models can be divided into different types based on the ordinary differential equations, partial differential equations and network dynamics(Xiehua, Shaozi, 2021). References: Xiehua, Y. and Shaozi, L., 2021. Analysis of a Worm Virus Propagation Model Based on Differential Equation.  2021 11th Inte...

Software (Example)

 Unfortunately, I cannot analyse malware with Wireshark, I do not have a safe environment to perform this test, but I simulated how the Wireshark can be used to analyse a malware: Start the Wireshark on Capture mode in a safe environment and run the malware. The program will collect all data sent and received, be possible to analyse what is the behaviour of the malware. In this image is possible to see the (three-way handshake) on the green line, which means the website completed all the processes of receiving, checking and confirming. Also, we can see the IP of the source and the IP of the Destination and make it possible to track all routes of the malware.

Software (Evaluation-Functionalities)

 This is the program's main page, and it is possible to see some functions, such as Capture, Analyze and other valuable functions. On this page, we can see to program ruing in mode capture and collecting all eth0 access, it is possible to analyse by protocol and hexadecimal.

Software (Overview)

Today I will give an overview of the software Wireshark. The Wireshark is a tool for collecting and analysing network data. While a web proxy, such as Fiddler, focuses on HTTP/HTTPS traffic, Wireshark enables deep packet analysis of numerous protocols at several levels. While analysing packet captures in Wireshark, it is also possible to retrieve files from the pcap that have been downloaded by the virus(Fox, 2021)   According to CompTIA(2022), Wireshark is the most popular packet sniffer. Wireshark, like any other packet sniffer, performs three functions: Packet Capture: Wireshark listens in real-time to a network connection and then captures large streams of data — potentially tens of thousands of packets at a time. Filtering: Wireshark can slice and dice all of this random live data using filters. You can get only the information you need by using a filter. Visualisation: Like any decent packet sniffer, Wireshark allows you to dig right into the centre of network transmission...

Primary Research (General Questions Analysis)

To continue the analysis, most of the incidents happen with the owed computers are 63% of the answers. How is it possible to see that malware damage in a significant part of the answers affected the computational performance. 36% of the people who filled the questionnaire affirmed it happened when they had downloaded software or another download on the internet. The majority of answers to keep their devices protected were anti-malware. In total, 50% of the answers. 45% of the people used antivirus(anti-malware) to solve their malware issues. With this questionnaire, the main problem of malware attacks is that the protection software is expensive. How is it possible to see it! In the chart, 63% of the answers. Most people do not know how the attack happened. 36% of the answers. Finally, it is possible to see people start learning how to prevent but are still not completely sure.