Download PDFOpen PDF in browser

A Progressive Approach Towards Securing Hospital Networks from Packet Sniffing Using Wireshark

EasyChair Preprint no. 7561

8 pagesDate: March 13, 2022

Abstract

In recent times, we have been facing serious security breaches in computer-based hospital database systems, carried by the drastic growth in use of the internet and mobile devices. In this context, ‘Packet Sniffing’ can be mentioned as one of the most important terms. This is the technique/attack through which data, flowing as data-packets across the network can be detected and monitored. Some types of this attack which can be used on diverse levels of data transmission are MAC (Media Access Control) Flooding, DHCP (Dynamic Host Configuration Protocol) attacks, Rogue DHCP server attack, DHCP starvation attack, ARP (Address Resolution Protocol) Spoofing, DNS (Domain Name Server) Poisoning, MAC spoofing [1]. In this paper, a demonstration has been discussed on how packet sniffing works by using Wireshark; widely used packet sniffing tool and its effect on our healthcare systems followed by the ways to get protected from this kind of malicious attacks in the cyber world.

Keyphrases: ARP, DHCP, DNS, hospital network security, MAC, Packet Sniffing, Wireshark

BibTeX entry
BibTeX does not have the right entry for preprints. This is a hack for producing the correct reference:
@Booklet{EasyChair:7561,
  author = {Rudranil Maity and Rajdeep Chakraborty},
  title = {A Progressive Approach Towards Securing Hospital Networks from Packet Sniffing Using Wireshark},
  howpublished = {EasyChair Preprint no. 7561},

  year = {EasyChair, 2022}}
Download PDFOpen PDF in browser