Download PDFOpen PDF in browserA Progressive Approach Towards Securing Hospital Networks from Packet Sniffing Using WiresharkEasyChair Preprint 75618 pages•Date: March 13, 2022AbstractIn recent times, we have been facing serious security breaches in computer-based hospital database systems, carried by the drastic growth in use of the internet and mobile devices. In this context, ‘Packet Sniffing’ can be mentioned as one of the most important terms. This is the technique/attack through which data, flowing as data-packets across the network can be detected and monitored. Some types of this attack which can be used on diverse levels of data transmission are MAC (Media Access Control) Flooding, DHCP (Dynamic Host Configuration Protocol) attacks, Rogue DHCP server attack, DHCP starvation attack, ARP (Address Resolution Protocol) Spoofing, DNS (Domain Name Server) Poisoning, MAC spoofing [1]. In this paper, a demonstration has been discussed on how packet sniffing works by using Wireshark; widely used packet sniffing tool and its effect on our healthcare systems followed by the ways to get protected from this kind of malicious attacks in the cyber world. Keyphrases: ARP, DHCP, DNS, MAC, Packet Sniffing, Wireshark, hospital network security
|