Problem Statement

Network Traffic Analyzer

Network traffic analysis and monitoring, often known as “Packet 
Sniffing,” is a procedure used to maintain track of all incoming and outgoing traffic, network activity, and availability. It is used to spot  irregularities, pinpoint operational problems, and spot prospective risks and problems by contrasting realtime networks with historical data. You  can examine the data packets that are transferred across the  network for a project.

PS Number: PSCBS002

Domain Bucket: Cyber Security
Category: Software
Dataset : NA

We require software that allows you to use your networking abilities to discover these network anomalies. As an addition, you could create software that can tell whether a traffic analyzer is present in the network thanks to an outside agent.

Background of the Problem

Also called “Packet Sniffing”, network traffic analysis and monitoring is a process used to keep an eye on all incoming and outgoing traffic, network activity, and availability. It is used to detect anomalies, identifying operational issues, comparing real-time networks with historical data to identify potential threats and issues. For a project, you can analyze the data packets that are sent across the network. After analyzing these packets you can work on a report to give your insights, and if required, countermeasures if there is an anomaly.

Objective

We need a software in which using your networking skills you can find out such anomalies in the network also as an extension, you could also devise software that could identify if there is a traffic analyzer in the network by an external agent.”

Summary

Also called “Packet Sniffing”, network traffic analysis and monitoring is a process used to keep an eye on all incoming and outgoing traffic, network activity, and availability. It is used to detect anomalies, identifying operational issues, comparing real-time networks with historical data to identify potential threats and issues. For a project, you can analyze the data packets that are sent across the network. After analyzing these packets you can work on a report to give your insights, and if required, countermeasures if there is an anomaly.