Network Traffic Analysis To Classify Malicious And Non-Malicious Traffic

Authors

  • Thanushiya.S Department of Computer Science and Engineering, Kamaraj College of Engineering and Technology, Virudhunagar, India. Author
  • Kiruthika.S Department of Computer Science and Engineering, Kamaraj College of Engineering and Technology, Virudhunagar, India. Author
  • Mary selja. J Department of Computer Science and Engineering, Kamaraj College of Engineering and Technology, Virudhunagar, India. Author
  • Mr. JohnLivingston Assistant Professor, Department of Computer Science and Engineering, Kamaraj College of Engineering and Technology, Virudhunagar, India. Author

DOI:

https://doi.org/10.47392/IRJAEH.2025.0028

Keywords:

cybersecurity defenses, real-time visualization, Grafana, threat identification, anomaly detection, traffic classification, machine learning, Wireshark, network traffic analysis, real-time detection, malicious activities, network traffic monitoring, network security, cyber threats

Abstract

In the face of increasingly sophisticated cyber threats, ensuring network security is crucial for organizations aiming to protect sensitive data, maintain service continuity, and avoid financial losses. Effective network traffic monitoring is essential for identifying malicious activities that can compromise network integrity. Traditional methods, however, often struggle to keep up with evolving attack techniques, especially when real-time detection and rapid response are needed. This project presents an innovative network traffic analysis system that integrates the capabilities of Wireshark, machine learning, and Grafana. Wireshark provides in-depth packet inspection, while machine learning enables automatic traffic classification and anomaly detection, offering a proactive approach to threat identification beyond traditional rule-based methods. Grafana’s customizable real-time visualization displays the analyzed data, providing network administrators with a clear, accessible view to identify patterns and make informed security decisions. This unified approach delivers a scalable, comprehensive solution for modern network environments, enhancing real-time threat detection while minimizing false positives and empowering organizations to fortify their cybersecurity defences effectively.

Downloads

Download data is not yet available.

Downloads

Published

2025-02-17

How to Cite

Network Traffic Analysis To Classify Malicious And Non-Malicious Traffic . (2025). International Research Journal on Advanced Engineering Hub (IRJAEH), 3(02), 205-209. https://doi.org/10.47392/IRJAEH.2025.0028

Similar Articles

1-10 of 336

You may also start an advanced similarity search for this article.