ANALYSIS OF COMPUTER NETWORK SECURITY AGAINST PACKET INTERCEPTION: A CASE STUDY OF THE COLLEGE OF NURSING

2025;
: 106-119
https://doi.org/10.23939/ujit2025.02.106
Received: August 08, 2025
Revised: October 20, 2025
Accepted: October 30, 2025

Цитування за ДСТУ: Шихаб Л. А., Вахіб Х. Н. Аналіз безпеки комп’ютерної мережі проти перехоплення пакетів: кейс коледжу медсестринства. Український журнал інформаційних технологій. 2025, т. 7, № 2. С. 106–119.
Citation APA: Shihab, L. A., & Waheeb, H. N. (2025). Analysis of computer network security against packet interception: A case study of the College of Nursing. Ukrainian Journal of Information Technology, 7(2), 106–119. https://doi.org/10.23939/ujit2025.02.106

1
University of Basrah, Basrah, Iraq
2
University of Basrah, Basrah, Iraq

Society has enjoyed technological developments, especially in the field of information, one of which has developed currently is the internet. In its use, the networks used by the public are LAN cables or Wi-Fi (without cables), attacks from irresponsible parties, namely hackers who can exploit important user data, intercept data such as passwords and change user data. This research discusses the evaluation of the security level of Wi-Fi facilities at University of Basrah compus,basrah, Governorate, Iraq using the Aircrack-ng, Kismet and ettercap applications. Aircrack-ng is a Wi-Fi hacking tool that is used to detect and identify open wireless signals. Kismet is alternative software whose function is exactly the same as Aircrack-ng. Ettercap is a packet sniffer tool used to analyse network protocols and audit network security, which also has the ability to block traffic on LAN networks, steal passwords, and carry out active eavesdropping on common protocols. In this research, two stages were carried out, the first was to identify the existence and security of the Wi-Fi used using Kismet software. The second stage carried out a packet sniffing attack using Ettercap software as a security testing step at the University of Basrah compus, basrah, Governorate, Iraq.

1 Ansari, S., Rajeev, S. G., & Chandrashekar, H. S. (2003). Packet sniffing: A brief introduction. IEEE Potentials, 21(2), 17–19. https://doi.org/10.1109/MP.2002.1166620
2 Anu, P., & Vimala, S. (2017). A survey on sniffing attacks on computer networks. International Conference on Intelligent Computing and Control (I2C2), 1–5. https://doi.org/10.1109/ I2C2. 2017.8321914
3 Bakare, B., & Minah-Eeba, W. (2019). A comprehensive review of wireless fidelity (Wi-Fi) technology in Nigeria. IOSR Journal of Electronics and Communication Engineering, 13(3), 37–42. https://doi.org/10.9790/2834-1303023742
4. Das, R., & Tuna, G. (2017). Packet tracing and analysis of network cameras with Wireshark. Proceedings of the 2017 International Symposium on Digital Forensics and Security (ISDFS), 1–6. https://doi.org/10.1109/ISDFS.2017.7916510
5. Fatimah, T. M., & Pernanda, A. Y. (2022). Wi-Fi network security analysis against packet sniffing attacks at Universitas PGRI Sumatera Barat. JURTEII: Jurnal Teknologi Informasi, 1(2), 7–11.
6. Fajaryanto, A., Dirgahayu, T., & Prayudi, Y. (2015). Implementation of the ISSAF and OWASP version 4 methods for web server vulnerability testing. NERO Scientific Journal, 1(3), 190–197.
7. Huai, S., & Zhongsheng, W. (2020). Research and implementation of future network router. International Journal of Advanced Network, Monitoring and Controls, 5(1), 10–22. https://doi.org/10.21307/ijanmc-2020-012
8. Shihab, L. A. (2022). Study and evaluation of wireless sensor networks performance. Webology, 19(1).
9. Shihab, L. A. (2025). Real time attack prevention for industrial IoT network. Journal of Machine and Computing, 5(4).
10. Nazir, R., Laghari, A., Kumar, K., David, S., & Ali, M. (2021). Survey on wireless network security. Archives of Computational Methods in Engineering, 29(5). https://doi.org/10.1007/s11831-021-09631-5
11. Paravathi, C., Roshini, D., & Nayak, S. S. (2014). Packet sniffing. International Journal of Engineering and Management Research, 14(1), 71–76.
12. Prabadevi, B., & Nagamalai, J. (2018). A review on various sniffing attacks and its mitigation techniques. Indonesian Journal of Electrical Engineering and Computer Science, 12(3), 1117–1125. https://doi.org/10.11591/ijeecs.v12.i3.pp1117-1125
13. Qadeer, M., Iqbal, A., Zahid, M., & Siddiqui, M. (2010). Network traffic analysis and intrusion detection using packet sniffer. International Conference on Communication Software and Networks (ICCSN), 313–317. https://doi.org/10.1109/ ICCSN. 2010.104
14. Rahman, R., & Tomar, D. (2018). Security attacks on wireless networks and their detection techniques. In Advances in Information Communication Technology and Computing (pp. 185–201). Springer. https://doi.org/10.1007/978-981-13-0396-8_13
[15]. Rusdan, M., Manurung, D., & Genta, F. (2020). Evaluation of wireless network security using information system security assessment framework (ISSAF): Case study of PT. Keberlanjutan Strategis Indonesia. Test Engineering and Management, 83, 15714–15719.
16. Surarapu, P., Mahadasa, R., Vadiyala, V. R., & Baddam, P. R. (2023). An overview of Kali Linux: Empowering ethical hackers with unparalleled features. Journal of Emerging Technologies, 1, 171–180.
17. Sadkhan, S. B., & Abbas, N. (2013). Privacy and security of wireless communication networks. In Mobile networks and cloud computing convergence for progressive services and applications (pp. 58–78). IGI Global.
18. University of Basrah. (n.d.). Official website. Retrieved from https://www.uobasrah.edu.iq
19. Xiao, M., & Guo, M. (2020). Computer network security and preventive measures in the age of big data. Procedia Computer Science, 166, 438–442. https://doi.org/10.1016/j.procs.2020. 02.068