When any data has to be transmitted over the computer network, it is broken down into smaller units at the sender’s node called data packets and reassembled at receiver’s node in original format. It is the smallest unit of communication over a computer network. It is also called a block, a segment, a datagram or a cell. The act of capturing data packet across the computer network is called packet sniffing. It is similar to as wire tapping to a telephone network. It is mostly used by crackers and hackers to collect information illegally about network. It is also used by ISPs, advertisers and governments.
ISPs use packet sniffing to track all your activities such as:
- who is receiver of your email
- what is content of that email
- what you download
- sites you visit
- what you looked on that website
- downloads from a site
- streaming events like video, audio, etc.
Advertising agencies or internet advertising agencies are paid according to:
- number of ads shown by them.
- number of clicks on their ads also called PPC (pay per click).
To achieve this target, these agencies use packet sniffing to inject advertisements into the flowing packets. Most of the time these ads contain malware.
Government agencies use packet sniffing to:
- ensure security of data over the network.
- track an organisation’s unencrypted data.
Packet Sniffer –
Packet sniffing is done by using tools called packet sniffer. It can be either filtered or unfiltered. Filtered is used when only specific data packets have to be captured and Unfiltered is used when all the packets have to be captured. WireShark, SmartSniff are examples of packet sniffing tools.
How to prevent packet sniffing –
- Encrypting data you send or receive.
- using trusted Wi-Fi networks.
- Scanning your network for dangers or issues.
- Pipelining in Packet Switching
- Packet flow in different Network
- Packet flow in the same Network
- Packet Capturing using JnetPcap in Java
- General Packet Radio Service (GPRS)
- Packet Switching and Delays in Computer Network
- Difference between Circuit Switching and Packet Switching
- Kotlin Data Classes
- Kotlin hashSetOf()
- Difference between Spoofing and Phishing
- Introduction of Botnet in Computer Networks
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.