Approaches to solving the problem of network communications traffic monitoring and processing of its results
DOI:
https://doi.org/10.15587/1729-4061.2013.19418Keywords:
sniffer, network systems, administrationAbstract
The development of computer networks in the IT industry passes very quickly, trying to satisfy constantly increasing demand for fast and high-quality connection to the global Internet network. That is why, there is a need for the development of the specialized software (sniffer), which would simplify the work of system administrators in debugging of networks and would allow less competent experts in this sphere to start performing such work.
The analysis of the systems of analogues, which have a number of disadvantages, the main of which are the presence of console interface only and difficulty of use because of the increased requirements for the user’s knowledge in the field of network technologies was conducted.
Some of them support Linux systems only, that makes them unsuitable for the use on most desktop computers. The considered systems do not have the realized construction of graphical results that could be quite a valuable tool in the study of networks. Therefore, there is a need for the development of the specialized software, which would simplify the work of system administrators in debugging of networks and would allow less competent experts in this sphere to start performing such work.
The analysis of approaches to the solution of the problem of network traffic monitoring and processing of its results was carried out. Modern network systems and problems, which arise in the study of their condition, were considered.
As a result of the analysis of existing methods for the study of network systems it was proposed to use the method of listening to the network interface as the way of the study of network systems for further system administration.References
- Медведовский, И. Д. Атака на Internet [Текст] / И. Д. Медведовский, П. В. Семьянов, Д. Г. Леонов // М.: ДМК, 2000. – 476 с.
- Буров, Є. В. Комп'ютерні мережі [Текст] / Є. В. Буров // Львів: «Магнолія 2006», 2006. – 563 с.
- Политанский, Р. Л. Исследование зависимости корреляции между несущим и информационным сигналом в системах с динамическим хаосом [Текст] / Р. Л. Политанский, Л. Ф. Политанский, С. Д. Галюк, Н. Я. Кушнир // Східно-Європейський журнал передових технологій. - 2011 - №2/3(50). – С 58-63.
- Политанский, Р.Л. Исследование свойств цикличности псевдослучайных последовательностей битов / Р.Л. Политанский, Л.Ф. Политанский, М.Я. Кушнир. // Східно-Європейський журнал передових технологій. - 2009 - №6/2(42). – С 64-66.
- Скопа, О.О. Вплив функціональної надмірності резервованих систем телекомунікацій на скорочення обсягів їх випробувань на надійність / О.О. Скопа, Н.Ф. Казакова, О.С. Мурін // Наук. праці ДонНТУ. Серія: Обчислювальна техніка та автоматизація. Випуск 58. – Донецьк: РВА ДонНТУ, 2003. - С.115-121.
- Скопа, О. О. Принципи вибору формальних параметрів при побудові профілей захисту інфоресурсів [Текст] / Ю. В. Щербина, С. Л. Волков, О. О. Скопа // Східно-¬Європейський журнал передових технологій. — 2012. — T. 5, № 2(59). — С. 31—33.
- Мухін, О.М. Планування обсягу випробувань в мережах телекомунікацій / О.М. Мухін, Н.Ф. Казакова, О.О. Скопа // Вісник УБЕНТЗ. – 2002. - №2. - С.104-109.
- Скопа, О. О. Аналіз моделей первинних датчиків псевдовипадкових чисел [Текст] / Н. М. Білик, О. О. Скопа // Системи обробки інформації. – 2009. – №7 (79). – С. 56-59. – ISSN 1681-7710.
- Скопа, О. О. Статистичне тестування симетричних криптографічних перетво¬рень [Текст] / О. О. Скопа // Східно-Європейський журнал передових тех¬но¬ло¬гій. – 2011. – №4/9 (52). – С. 15-18. – ISSN 1729-4061.
- Скопа, О. О. Інструментальні засоби статистичного тестування крипто¬гра¬фіч¬них перетворень [Текст] / О. О. Скопа // Вісник Національного технічного уні¬вер¬ситету «ХПІ». – 2011. – №33. – С. 77-83. – ISSN 2079-0023.
- Шнайер, Б. Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си [Текст] : пер. з англ. / Брюс Шнайер. – М. : Триумф, 2002. – 816 с. – ISBN 5-89392-055-4, 0-471-11709-9.
- Siegenthaler, T. Gorrelation-Immunity of Nonlinear Combining Functions for Cry¬ptographic Applications [Текст] / Т. Siegenthaler // IEEE Transactions on Information Theory. – 1984. – V. IT 30, №5. – Р. 776-780. – ISSN 0018-9448.
- Matsumoto, M. Mersenne Twister: a 623-dimensionally equidistributed uniform pseudo-random number generator [Текст] / M. Matsumoto, T. Nishimura // ACM Trans. on Modeling and Computer Simulation. – 1998. – №8. – Р. 3-30. – ISSN 1049-3301.
- Столлингс В. Современные компьютерные сети. 2-е изд. [Текст] / В. Столлингс // СПб.: Питер, 2003. – 783 с.
- Олифер В. Г. Новые технологии и оборудование IP-сетей. 4-е изд. [Текст] / В. Г. Олифер, Н. А. Олифер // СПб.: BHV-Санкт-Петербург, 2010. – 943 с.
- Medvedovskyy, I.D., Semyanov, P.V., Leonov, D.G. (2000). The attack on the Internet. Moscow : MQM, 476.
- Burov, Y.V. (2006). Computer Networks. Magnolia, 563.
- Polytanskyy, R. L. (2011). Study of the dependence of correlation between the carrier and information signals in systems with dynamical chaos. Eastern-European Journal of Enterprise Technologies, V.2, № 3(50), 58-63.
- Politansky, R.L. (2009). Investigation of properties of cyclic sequences of pseudorandom bits. Eastern-European Journal of Enterprise Technologies. - №6/2(42). – P. 64-66.
- Skopa O. O. (2003). Effect of functional redundancy redundant telecommunications systems to reduce the amount of their reliability tests. Donets'k: RVA DNTU №58. – P. 115-121.
- Skopa, O. O. (2012). Principles of selection of formal parameters in the construction of information resources protection profiles. Eastern-European Journal of Enterprise Technologies, № 2(59), 31-33.
- Mukhin, A. (2002). Planning of trials in telecommunications networks. Bulletin UBENTZ, 2, 104-109.
- Skop,a O. O. (2009). Analysis of the primary models of pseudorandom numbers. Information processing systems, 7 (79), 56-59.
- Skopa, O. O. (2011). The statistical testing of symmetric cryptographic. Eastern-European Journal of Enterprise Technologies. №4/9 (52). – P. 15-18. – ISSN 1729-4061.
- Skopa, O. O. (2011). Tools of the statistical testing of cryptographic transformations. Proceedings of the National Technical University "KPI", 33, 77-83.
- Schneier, B. (2002). Applied Cryptography. Protocols, algorithms, source code in C language. Triumph, 816.
- Siegenthaler, T. (1984). Gorrelation-Immunity of Nonlinear Combining Functions for Cry¬ptographic Applications. IEEE Transactions on Information Theory, V. IT 30, №5, 776-780.
- Matsumoto, M. (1998). Mersenne Twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. on Modeling and Computer Simulation. – №8. – Р. 3-30. – ISSN 1049-3301.
- Stallings, V. (2003). Modern computer networks. 2nd ed. St. Petersburg.: Peter, 783.
- Olifer, V.G., Olifer, N.A. (2010). New technologies and equipment IP-based networks. 4th ed. St. Petersburg.: Peter, 943.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 Ростислав Богданович Скрип’юк
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.