|
[1].J. Postel, “TELNET PROTOCOL SPECIFICATION”, RFC-854, May 1983. [2].B. Kantor, “BSD Rlogin”, RFC-1258, December 1991. [3].T. Berners-Lee, “Hypertext Transfer Protocol -- HTTP/1.0”, RFC- 1945, May 1996. [4].R. Fielding, “Hypertext Transfer Protocol -- HTTP/1.1”, RFC-2616, June 1999. [5].J. Klensin, “Simple Mail Transfer Protocol”, RFC-2821, April 2001. [6].Brian Kantor, “Network News Transfer Protocol”, RFC-977, February 1986. [7].J. Myers, “Post Office Protocol - Version 3”, RFC-1939, May 1996. [8].J. Postel, “FILE TRANSFER PROTOCOL (FTP)”, RFC-959, October 1985. [9].M. Crispin, “INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1”, RFC-3501, March 2003. [10].The Tcpdump Group, “tcpdump and libpcap latest release”, https://www.tcpdump.org/, September, 18, 2017. [11].David C. Plummer, “An Ethernet Address Resolution Protocol or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware”, RFC-826, November 1982. [12]. Ramachandran, Vivek & Nandi, Sukumar, "Detecting ARP Spoofing: An Active Technique". In Jajodia, Suchil & Mazumdar, Chandan. Information systems security: first international conference, December 19–21, 2005. [13].Son, Sooel; Shmatikov, Vitaly. "The Hitchhiker's Guide to DNS Cache Poisoning" Cornell University Retrieved, April 3, 2017. [14].Abdul Nasir Khan, Kalim Qureshi, and Sumair Khan, “An Intelligent Approach of Sniffer Detection”, The International Arab Journal of Information Technology, Vol. 9, No. 1, January 2012. [15].Pallavi Asrodia , Mr. Vishal Sharma, “Network Monitoring and Analysis by Packet Sniffing Method”, International Journal of Engineering Trends and Technology (IJETT), Volume4 Issue5, May 2013. [16].Anubhi Kulshrestha, Sanjay Kumar Dubey, “A Literature Review on Sniffing Attacks in Computer Network”, International Journal of Advanced Engineering Research and Science (IJAERS) Vol-1, Issue-2, July 2014. [17].Inderjit Kaur1 , Harkarandeep Kaur , Er. Gurjot Singh, “Analysing Various Packet Sniffing Tools”, International Journal of Electrical Electronics & Computer Science Engineering Volume 1, Issue 5, October 2014. [18].Rupam, Atul Verma, Dr, and Ankita Singh. "An Approach to Detect Packets Using Packet Sniffing." International Journal of Computer Science & Engineering Survey 2013. [19].Asrodia, Pallavi, and Hemlata Patel. "Analysis of Various Packet Sniffing Tools for Network Monitoring and Analysis." International Journal of Electrical, Electronics and Computer Engineering 2012. [20].Ansari, S., S.g. Rajeev, and H.s. Chandrashekar. "Packet Sniffing: A Brief Introduction." IEEE Potentials 21.5 2002. [21]."4 Ways to Avoid Packet Sniffing and Data Theft." Hacker Not Cracker. N.p., n.d. Web. Dec. 2015. [22]."What Is a Packet?" HowStuffWorks. N.p., 30 Nov. 2000. Web. 28 Dec. 2015. [23]."A Quick Intro to Sniffers: Wireshark/Ethereal, ARPSpoof, Ettercap, ARP Poisoning and Other Niceties." A Quick Intro to Sniffers: Wireshark/Ethereal, ARPSpoof, Ettercap, ARP Poisoning and Other Niceties. IronGeek Web. 28 Dec. 2015. [24].Sankar, Ravi. "MAC Flooding with MACOF & Some Major Countermeasures." Kali Linux Tutorials. Kali Linux Tutorials, 22 Sept. 2015. Web. 2 Jan. 2016. [25].Spangler, Ryan. “Packet Sniffing on Layer 2 Switched Local Area Networks” n. pag. Http://www.packetwatch.net/. Web. 2 Jan. 2016. [26]."Layer 2 Security Features on Cisco Catalyst Layer 3 Fixed Configuration Switches Configuration Example." Cisco. Cisco, 17 Jan. 2007. Web. 3 Jan. 2016. [27].Shail Shah, Akshit Shah, Sahil Shah, Shivani Bhattcharjee, “Intrusion Detection using Packet Sniffer”, International Journal of Electronics, Electrical and Computational System IJEECS Volume 4, Issue 10 October 2015. [28].Pallavi Asrodia, Hemlata Patel, “Network traffic analysis using packet sniffer”, International Journal of Engineering Research and Application (IJERA), Vol.2, pp. 854-857, Issue 3, May-June 2012. [29].Inderjit Kaur, Harkarandeep Kaur, Er. Gurjot Singh,” Analysing Various Packet Sniffing Tools”, International Journal of Electrical Electronics & Computer Science Engineering Volume 1, Issue 5, October 2014). [30].Otusile Oluwabukola, Awodele Oludele, A.C Ogbonna, Ajeagbu Chigozirim, and Anyeahie Amarachi, “A Packet Sniffer (PSniffer) Application for Network Security in Java”, Issues in Informing Science and Information Technology Volume 10, 2013. [31].Neha Khandelwal, “Security in Cloud: Attacks & Prevention Techniques”, International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 5 Issue 1 January 2015. [32].Animesh Dubey , Ravindra Gupta , Gajendra Singh, “Survey and Analysis of Client Side Detection of Content Sniffing Attack”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 3, March 2013. [33].MeeraGandhi, S.K.Srivatsa, “Detecting and preventing attacks using network intrusion detection systems”, International Journal of Computer Science and Security, Volume (2): Issue (1), February 2008. [34].Harsha Gupta, Prof. Deepak Tomar, Dr. Asif Ullah Khan, “XSS Attack Detection in JSP and PHP: A Meta-Analysis Review”, International Journal of Scientific and Research Publications, Volume 5, Issue 8, August 2015.
|