Raspberry Pi Packet Sniffer

CONTENTS
ACKNOWLEDGEMENT.....................................i
ABSTRACT...........................................ii
1. INTRODUCTION.....................................1
2. PURPOSE..........................................3
2.1 Network Security Basics.........................3
2.2 Risk Management: The Game of Security ..........3
2.3 Types and Sources of Network Threats ...........4
2.3.1 Denial-of-Service ............................4
2.3.2 Unauthorized Access...........................5
2.3.3 Executing Commands Illicitly .................5
2.3.4 Confidentiality Breaches......................5
2.3.5 Destructive Behavior..........................6
2.3.6 Data ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

METHODOLOGIES....................................14
4.1 Raspberry Pi ...................................14
4.2 Kali Linux & Penetration Testing ...............15
4.3 Packet Sniffing ................................17
4.4 Our Setup.......................................19
5. APPLICATIONS ....................................20
6. ADVANTAGES.......................................21
7. FUTURE SCOPE.....................................22
8. CONCLUSION ......................................23
REFERENCES..........................................24

1. INTRODUCTION

While the usage of Wireless Local Area Networks (WLAN) has been tremendously increasing, the cost of wireless networking devices has decreased. This enables to extend network in an easier way. With the upcoming 802.11 ac protocol supporting speeds competing with Gigabit Ethernet and increased usage of mobile devices have boosted the demand of WLANs. Access points are replacing the wired ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

the network sniffing tools support monitoring wireless traffic. Jipping and Holland [2] demonstrated that a network sniffer and packet classifier can be developed in a high level language. Another study done by Shum et al. [3] showed that the location of the source can be estimated if the physical location of the access point is known. In this work, a custom software on a router is used to gather network traffic. Location estimation is done by calculating the signal strength. Following study [4] showed that Received Signal Strength Indicator (RSSI) can be given as an input to estimate the location. Shum and Ng [5] showed that there is a correlation between RSSI and inter-device distance. ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Raspberry Pi Packet Sniffer. (2017, May 24). Retrieved April 20, 2018, from http://www.essayworld.com/essays/Raspberry-Pi-Packet-Sniffer/106308
"Raspberry Pi Packet Sniffer." Essayworld.com. Essayworld.com, 24 May. 2017. Web. 20 Apr. 2018. <http://www.essayworld.com/essays/Raspberry-Pi-Packet-Sniffer/106308>
"Raspberry Pi Packet Sniffer." Essayworld.com. May 24, 2017. Accessed April 20, 2018. http://www.essayworld.com/essays/Raspberry-Pi-Packet-Sniffer/106308.
"Raspberry Pi Packet Sniffer." Essayworld.com. May 24, 2017. Accessed April 20, 2018. http://www.essayworld.com/essays/Raspberry-Pi-Packet-Sniffer/106308.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 5/24/2017 02:45:49 PM
Submitted By: abc123
Category: Computers
Type: Premium Paper
Words: 6106
Pages: 23

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
Internet 2
Online Sex Predators and Sexual...
Network Administration and Secu...
The Life of Pi
Why 2
Electronic Commerce
Hospice
Wire Pirates
Internet History Report
Windows NT
Copyright | Cancel | Contact Us

Copyright © 2018 Essayworld. All rights reserved