Analyzing Network Traffic in LANs for Threat Detection within SOC Environments

Abstract

As networks grow more complex, keeping them secure and running smoothly is more important than ever. Network Traffic Analysis (NTA) helps by continuously monitoring data as it flows through a network, making it easier to spot performance issues or potential threats like malware or cyberattacks. This project explores how Wireshark—an open-source tool widely used by network and security professionals—can be used to uncover these problems. Over four weeks, Wireshark was used to capture and study different types of network traffic, including TCP, UDP, and DNS, across both wired and wireless setups. We could detect warning signs such as ARP spoofing and unusual domain activity by applying filters, graphs, and hands-on packet inspections. The results demonstrate how effective Wireshark can be in identifying early signs of trouble and supporting the work of cybersecurity teams. It is a valuable tool for anyone looking to understand better and protect their network.

Country : Sultanate of Oman

1 Dr. Ramesh Palanisamy2 Mohammed Tauqeer Ullah3 Senthil Jayapal4 Mohamed R. Rafi5 Jeelani Basha Kattubadi

  1. College of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman
  2. College of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman
  3. College of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman
  4. College of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman
  5. College of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman

IRJIET, Volume 9, Issue 5, May 2025 pp. 263-272

doi.org/10.47001/IRJIET/2025.905035

References

  1. Alqaralleh, A. A., & Alshorman, H. M. (2019). Network analysis using Wireshark tool. International Journal of Advanced Computer Science and Applications (IJACSA), 10(3), 560–564.
  2. Anderson, M. (2023). Practical network monitoring with Wireshark and related tools. CyberTech Publishing.
  3. Anderson, T. (2023). Practical network forensics: Protocol analysis in cybersecurity. CyberTech Press.
  4. Brown, L. (2019). Understanding Wireshark: A beginner’s guide to packet analysis. Network Tools Publishing.
  5. Brown, L., & Garcia, M. (2021). Detecting anomalous HTTP traffic using open-source tools. Journal of Information Security Research, 10(2), 45–57.
  6. Cheng, Y., Wang, S., Li, X., & Wu, Q. (2019). A real-time network traffic visualization system for security monitoring. Journal of Network and Computer Applications, 125, 95–107. https://doi.org/10.1016/j.jnca.2018.10.007.
  7. Clark, J. (2022). ARP spoofing: Techniques and defenses in local area networks. NetSecure Publications.
  8. Clark, J., & Nguyen, P. (2022). Real-time detection of network anomalies using open-source tools. Journal of Cybersecurity Practices, 8(1), 34–47.
  9. Combs, G. (2007). Wireshark user’s guide. Wireshark Foundation. https://www.wireshark.org/docs/wsug_html_chunked/
  10. Dr. Palanisamy, R., Al-Shabibi, M. A. K., & Al Sabahi, K. H. Z. (2023). Evaluations of an ingenious medical hypertension alarm system for infants using IoT. International Research Journal of Innovations in Engineering and Technology (IRJIET), 7(10), 18–24. https://doi.org/10.47001/IRJIET/2023.710003.
  11. Dr. Palanisamy, R., Al Harthi, R. S. A., & Al-Dhafri, B. M. (2023). Utilizing the most recent app for confidential communication in the local area network. International Research Journal of Innovations in Engineering and Technology (IRJIET), 7(12), 182–188. https://doi.org/10.47001/IRJIET/2023.71202.
  12. Dr. Palanisamy, R., Mohamed, M. O. A. A. T. M., Viruthachalam, M., Kaliyamoorthy, K., & Jayapal, S. (2023). A method of detecting an object using the latest technology. International Research Journal of Innovations in Engineering and Technology (IRJIET), 7(12), 171–176. https://doi.org/10.47001/IRJIET/2023.712024.
  13. Dr. Palanisamy, R., & Al-Zakwani, H. H. (2023). An application-based tool that contains both an enhanced password generator and a password strength checker. International Research Journal of Innovations in Engineering and Technology (IRJIET), 7(12), 203–208. https://doi.org/10.47001/IRJIET/2023.712028.
  14. Heer, J., Shneiderman, B., & Park, B. (2014). Visual analytics: Definition, process, and challenges. In Information visualization (pp. 3–26). Springer.
  15. Jiang, S., Chen, H., Xu, Y., & Liu, M. (2020). Color-coded visualization for network anomaly detection. IEEE Access, 8, 160858–160868. https://doi.org/10.1109/ACCESS.2020.3013456
  16. Johnson, M., & Lee, R. (2021). Network traffic analysis techniques for cyber threat detection. International Journal of Information Security Research, 9(3), 112–125.
  17. Khan, M. I., Bokhari, M. U., & Rana, N. P. (2020). Network traffic analysis and security threats. Procedia Computer Science, 167, 1061–1070.
  18. Kim, H., & Feamster, N. (2013). Improving network management with software defined networking. IEEE Communications Magazine, 51(2), 114–119. https://doi.org/10.1109/MCOM.2013.6461197.
  19. Kumar, A., & Patel, S. (2021). Role of open-source tools in Security Operations Centers. Cybersecurity Trends, 5(2), 75–88.
  20. Kumar, R., & Singh, V. (2020). DNS tunneling as a covert channel: Detection strategies and network visibility. Cyber Defense Review, 7(3), 87–99.
  21. Kurose, J. F., & Ross, K. W. (2022). Computer networking: A top-down approach (8th ed.). Pearson.
  22. Lee, D., & Thompson, K. (2021). ICMP-based network reconnaissance: Tools and countermeasures. Network Security Journal, 19(1), 13–22.