Chibueze Ogbonna’s research while affiliated with Babcock University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (3)


comparison of packet sniffers based on Operating Systems
Packet Sniffer – A Comparative Characteristic Evaluation Study
  • Conference Paper
  • Full-text available

January 2015

·

2,925 Reads

·

9 Citations

·

Otusile Oluwabukola

·

Chibueze Ogbonna

·

As network continue to grow it is increasingly important that network administrators are aware of the different types of traffic that is traversing their networks as well as provides sufficient means for decision making process. Traffic monitoring and analysis is essential in order to more effectively troubleshoot and resolve issues when they occur, so as not to bring network services to a stand still for extended periods of time. Numerous tools are available to help administrators with the monitoring and analysis of network traffic. This paper present a comparative analysis of five existing packet sniffers vis-à-vis their performance.

Download

Figure1: Types of identity fraud. Source: Alexander (2015) 
Table 1 : Types of cyber attacks 
Figure 2: Make up of the Internet Source: Huttenlocher (2014) 
Table 2 : Security Methods 
Applications of Digital Watermarking to Cyber Security (Cyber Watermarking)

January 2015

·

5,726 Reads

·

16 Citations

Cyber security is generally an extension of the traditional information technology (IT) security that is aimed at protecting systems, applications and data that exposed to a variety of forms of attack via the internet, ranging from data theft and espionage to corruption of data and denial of service attacks. There is a need for an increase in cyber security research due to losses from sabotage being experienced by nations, businesses and individuals from various cybercrime attacks. This paper takes a look at the applications digital watermarking to the process of protection in cyber space called cyber watermarking particularly focusing on theft of information (identity & credit card theft).The methodology of the research is through literature search and case study. The rest of the paper presents a brief overview of the digital watermarking and issues in cyber security.


A Packet Sniffer (PSniffer) Application for Network Security in Java

January 2013

·

7,437 Reads

·

13 Citations

Issues in Informing Science and Information Technology

Otusile Oluwabukola

·

·

Chibueze Ogbonna

·

[...]

·

Amarachi Anyaehie

Citations (3)


... A modification of the Discrete Wavelet Transform (DWT) coefficient-based digital watermarking approach for online social networks is introduced by Thongkor et al. [56]. To protect cyberspace predominantly concentrating on information theft namely identity and credit card theft, thus cyber watermarking techniques are introduced by authors in [3]. ...

Reference:

A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication
Applications of Digital Watermarking to Cyber Security (Cyber Watermarking)

... The important point to be noted here is that to run the Wireshark tool, it sets the NIC to a promiscuous mode for enabling the sniffer to see all traffic on that interface, not just the traffic that is addressed to one of the configured interfaces. Besides the promiscuous mode, it may enable the port mirroring to any points of the network when the promiscuous mode does not cover all networks [8] [9]. ...

Packet Sniffer – A Comparative Characteristic Evaluation Study

... A case diagram is a specific behavioral diagram in the Unified Modeling Language (UML) that comes from and is defined by a use-case investigation [14]. Its goal is to present a graphical description of the actors, goals, and dependencies between those use cases that make up the system's functionality. ...

A Packet Sniffer (PSniffer) Application for Network Security in Java

Issues in Informing Science and Information Technology