Computer Network Analysis for a Network User Behaviour: A Case Study of Buildings PPBS D Jatinangor

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2016 by IJETT Journal
Volume-41 Number-1
Year of Publication : 2016
Authors : Drs. Ino Suryana, M.Kom, Rudi Rosadi, S.Si., M.Kom, Deni Setiana,S.Si., M.CS, Izzan Lastryana Oktiadi
DOI :  10.14445/22315381/IJETT-V41P209

Citation 

Drs. Ino Suryana, M.Kom, Rudi Rosadi, S.Si., M.Kom, Deni Setiana,S.Si., M.CS, Izzan Lastryana Oktiadi"Computer Network Analysis for a Network User Behaviour: A Case Study of Buildings PPBS D Jatinangor", International Journal of Engineering Trends and Technology (IJETT), V41(1),37-43 November 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Computer networks are widely used for various purposes. User of computer networks need to be analyzed, to determine how effective the computer network is used. Network forensics plays an important role to transform the data packet into a structure that can be understood for further use. Packet sniffing process took the entire packet on the network, the classification used here is the port and protocol. In this thesis carried out the manufacture of desktop-based network tools using Visual Studio 2013 and C # programming language. Tools can classify network users with data sources .pcap format. Based on the test results, resulting that HTTP / HTTPS is active in wireless and wired than already access the website / server that leads to education. VPN is more active than the wired LAN. Dropbox is widely used on wired or wireless networks. Based on bytes in Wednesday on the wireless and wired is the highest compared to other days. Based on the IP header length no attack happened.

 References

[1] A. Srivastav, and I. Ali, “Network Forensics an emerging approach to an network analysis”, International Journal of Computer Science & Engineering Technology (IJCSET), vol. 5 no.02, pp.118-123, Feb.2014.
[2] P. Asrodia, and V. Sharma, “Network Monitoring and Analysis by Packet”, International Journal of Engineering Trends and Technology (IJETT), vol. 4 issue.5, pp.2133-2135, May.2013.
[3] P. Asrodia, and H. Patel, “Network Traffic Analysis Using Packet Sniffer”, International Journal of Engineering Research and Applications (IJERA), vol. 2 issue.3, Pp.854-856, May-June.2012.
[4] Andrew S.T, Computer Networks 4th Edition, New Jersey: Prentice Hall, 2003.
[5] J. Reynolds, & J. Postel, “RFC 1700: Assigned Number”. Internet Engineering Task Force (IETF), pp.15-55, Oct.1994.
[6] (2016) Wikipedia List of TCP and UDP port numbers. [Online]. Available: https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
[7] I. Riadi, J. E. Istiyanto, A. Ashari and Subanar, “Internet Forensics Framework Based-on Clustering”, (IJACSA) International Journal of Advanced Computer Science and Applications. vol. 4 no.12, pp.115-123, 2013.

Keywords
Computer Network, Network Forensic, Port, Protocol, Packet Sniffing.