International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 41 | Number 1 | Year 2016 | Article Id. IJETT-V41P209 | DOI : https://doi.org/10.14445/22315381/IJETT-V41P209

Computer Network Analysis for a Network User Behaviour: A Case Study of Buildings PPBS D Jatinangor


Drs. Ino Suryana, M.Kom, Rudi Rosadi, S.Si., M.Kom, Deni Setiana,S.Si., M.CS, Izzan Lastryana Oktiadi

Citation :

Drs. Ino Suryana, M.Kom, Rudi Rosadi, S.Si., M.Kom, Deni Setiana,S.Si., M.CS, Izzan Lastryana Oktiadi, "Computer Network Analysis for a Network User Behaviour: A Case Study of Buildings PPBS D Jatinangor," International Journal of Engineering Trends and Technology (IJETT), vol. 41, no. 1, pp. 37-43, 2016. Crossref, https://doi.org/10.14445/22315381/IJETT-V41P209

Abstract

Computer networks are widely used for various purposes. User of computer networks need to be analyzed, to determine how effective the computer network is used. Network forensics plays an important role to transform the data packet into a structure that can be understood for further use. Packet sniffing process took the entire packet on the network, the classification used here is the port and protocol. In this thesis carried out the manufacture of desktop-based network tools using Visual Studio 2013 and C # programming language. Tools can classify network users with data sources .pcap format. Based on the test results, resulting that HTTP / HTTPS is active in wireless and wired than already access the website / server that leads to education. VPN is more active than the wired LAN. Dropbox is widely used on wired or wireless networks. Based on bytes in Wednesday on the wireless and wired is the highest compared to other days. Based on the IP header length no attack happened.


Keywords

Computer Network, Network Forensic, Port, Protocol, Packet Sniffing.

References

[1] A. Srivastav, and I. Ali, “Network Forensics an emerging approach to an network analysis”, International Journal of Computer Science & Engineering Technology (IJCSET), vol. 5 no.02, pp.118-123, Feb.2014.
[2] P. Asrodia, and V. Sharma, “Network Monitoring and Analysis by Packet”, International Journal of Engineering Trends and Technology (IJETT), vol. 4 issue.5, pp.2133-2135, May.2013.
[3] P. Asrodia, and H. Patel, “Network Traffic Analysis Using Packet Sniffer”, International Journal of Engineering Research and Applications (IJERA), vol. 2 issue.3, Pp.854-856, May-June.2012.
[4] Andrew S.T, Computer Networks 4th Edition, New Jersey: Prentice Hall, 2003.
[5] J. Reynolds, & J. Postel, “RFC 1700: Assigned Number”. Internet Engineering Task Force (IETF), pp.15-55, Oct.1994.
[6] (2016) Wikipedia List of TCP and UDP port numbers. [Online]. Available: https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
[7] I. Riadi, J. E. Istiyanto, A. Ashari and Subanar, “Internet Forensics Framework Based-on Clustering”, (IJACSA) International Journal of Advanced Computer Science and Applications. vol. 4 no.12, pp.115-123, 2013.

Time: 0.0014 sec Memory: 32 KB
Current: 1.88 MB
Peak: 4 MB