CFP last date
20 May 2024
Reseach Article

Packet Crafting Tools for Cyber Crime Security Attacks

by Prathyusha Kanakam, ASN Chakravarthy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 31
Year of Publication: 2020
Authors: Prathyusha Kanakam, ASN Chakravarthy
10.5120/ijca2020920360

Prathyusha Kanakam, ASN Chakravarthy . Packet Crafting Tools for Cyber Crime Security Attacks. International Journal of Computer Applications. 176, 31 ( Jun 2020), 28-30. DOI=10.5120/ijca2020920360

@article{ 10.5120/ijca2020920360,
author = { Prathyusha Kanakam, ASN Chakravarthy },
title = { Packet Crafting Tools for Cyber Crime Security Attacks },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2020 },
volume = { 176 },
number = { 31 },
month = { Jun },
year = { 2020 },
issn = { 0975-8887 },
pages = { 28-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number31/31402-2020920360/ },
doi = { 10.5120/ijca2020920360 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:43:58.611119+05:30
%A Prathyusha Kanakam
%A ASN Chakravarthy
%T Packet Crafting Tools for Cyber Crime Security Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 31
%P 28-30
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to the advancement in the Internet which is coined as the network of networks, there may have a chance to raise a lot of vulnerabilities during the communication of peers that challenge network’s security issue. All the security breaches including firewalls are failed to overcome these vulnerabilities. Packet Crafting is one of all those security attacks. It is the process that changes the information transferred between various peers of the network in a digital manner. In this paper, a detailed report on packet crafting as well as various investigating tools related to this type cyber-crime is presented.

References
  1. Berghel, Hal. "Phishing mongers and posers." Communications of the ACM 49.4 (2006): 21-25.
  2. Feinstein, Laura, et al. "Statistical approaches to DDoS attack detection and response." Proceedings DARPA information survivability conference and exposition. Vol. 1. IEEE, 2003.
  3. Feinstein, Laura, et al. "Statistical approaches to DDoS attack detection and response." Proceedings DARPA information survivability conference and exposition. Vol. 1. IEEE, 2003.
  4. Hussain, S. Mahaboob, et al. "Forensics Data Analysis for Behavioral Pattern with Cognitive Predictive Task." International Conference on Next Generation Computing Technologies. Springer, Singapore, 2017.
  5. Malekzadeh, Mina, and Moghis Ashrostaghi. "COL-MOD: A New Module to Quantify the Weight of Damage Incurred by Collision Attacks." IJ Network Security 19.4 (2017): 583-592.
  6. Kumar, P., P. Senthil, and S. Arumugam. "Establishing a valuable method of packet capture and packet analyzer tools in firewall." International Journal of Research Studies in Computing 1 (2011).
Index Terms

Computer Science
Information Sciences

Keywords

Cyber-crimes Cyber-Forensics Intruder detection Packet crafting