EKETE - INTERNATIONAL JOURNAL OF ADVANCED RESEARCH
Home > Vol 2, No 2 (2024) > Asoronye

Enhancing Data Security Analysis on the Akanu Ibiam Federal Polytechnic Unwana Website through Wireshark Application Utilization

Gaylord Ogbonna Asoronye, Emmanuel Okekenwa, Blessing Obianuju Osuesu

Abstract


Data security is paramount in the era of digital communication, particularly across networks. The proliferation of computer networks and open systems has made accessibility more convenient but has also introduced vulnerabilities, exposing data transmission to risks from unauthorized interception or exploitation by malicious entities. Malware, including various categories such as adware and Trojans, pose threats to software security, while internet protocols like HTTP are susceptible to exploitation, leading to data breaches and unauthorized access. The study focused on analyzing the security vulnerabilities within the Akanu Ibiam Federal Polytechnic (A.I.F.P.U.) website, a pivotal tool in managing and facilitating the learning process. Through the implementation of Wireshark, a network protocol analyzer, data packets transmitted via the HTTP protocol were captured and analyzed to identify potential risks, particularly regarding usernames and passwords. The findings highlight significant security gaps within the A.I.F.P.U. website, emphasizing the urgent need for enhanced security measures. Recommendations include the implementation of HTTPS protocol, adoption of Multi-Factor Authentication (MFA), active monitoring of website logs, regular password changes, and hashing passwords before storage. Implementing these recommendations would significantly enhance the security posture of the A.I.F.P.U. website, mitigating potential risks of data breaches and unauthorized access. Furthermore, the study underscores the importance of utilizing tools like Wireshark for assessing data traffic security, thereby fortifying the overall security of web applications.Top of Form


Keywords


Vulnerabilities, Security, Wireshark, A.I.F.P.U., Data security

Full Text:

PDF PDF

References


Ahmad, M. (2020). Forensic Analysis of Peer-to-Peer Network Traffic with Wireshark. Sule Lamido University Journal of Science and Technology, 1(2), pp. 92-99

Dodiya, B., & Singh, U. (2022). Malicious Traffic analysis using Wireshark by collection of Indicators of Compromise. International Journal of Computer Applications. 183(53) 975-8887

H. Kim, H. Lee & H. Lim. (2020). Performance of Packet Analysis between Observer and WireShark, International Conference on Advanced Communication Technology (ICACT), Phoenix Park, Korea (South), 2020, pp. 268-271

Iqbal, H., & Naaz, S. (2019). Wireshark as a Tool for Detection of Various LAN Attacks. International Journal of Computer Sciences and Engineering, 7(5), 833–837

Malek, M. S. A., & Amran, A. R. (2021). A Study of Packet Sniffing as an Imperative Security Solution in Cybersecurity. Journal of Engineering Technology, 9(1), pp. 96–101

Ritinder, K. (2019). Investigating Network Traffic using Packet Sniffing Tool-Wireshark. Journal of Emerging Technologies and Innovative Research, 6(1), pp. 181-186

Varghese, J.E., & Muniyal, B. (2021). A Pilot Study in Software-Defined Networking Using Wireshark for Analyzing Network Parameters to Detect DDoS Attacks. In: Kaiser, M.S., Xie, J., Rathore, V.S. (eds) Information and Communication Technology for Competitive Strategies (ICTCS 2020). Lecture Notes in Networks and Systems, Vol 190. Springer, Singapore

Wang, S., Xu, D., & Yan, S. (2010). Analysis and application of Wireshark in TCP/IP protocol teaching. In International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT) Shenzhen, pp. 269-272


Refbacks

  • There are currently no refbacks.


EKETE - INTERNATIONAL JOURNAL OF ADVANCED RESEARCH.   Powered by Journalsplace.org