The International Arab Journal of Information Technology (IAJIT)


IoT Based Technique for Network Packet Analyzer

Nouh Alhindawi,

Network demands are expanding dramatically, especially in educational sectors where systems are acting in a non- tradition network environment. Most of the services are published on the cloud so students can access teaching or learning materials directly; such demand is a heavy burden to systems administrators who needs to monitor critical educational services around the clock. However, such solutions need efforts, money, time, and space to be built; in this paper, the Internet of Things (IoT) is proposed as a small and cheap device that can be installed and configured to analyze packets locally for each service while analyzed logs can be synced simultaneously to have a complete view about systems behavior from any location for the education’s system. Based on the results, the proposed approach showed a significant solution for the heavy demands on the educational system. Moreover, the results showed that the presented approach is more efficient when compared to the state of art packet analysis and monitoring approaches.

[1] Abdrabou A., Darei M., Prakash M., and Zhuang W., “Application-Oriented Traffic Modeling of WiFi-Based Internet of Things Gateways,” IEEE Internet of Things Journal, vol. 9, no. 2, pp. 1159- 1170, 2022. DOI: 10.1109/JIOT.2021.3079115

[2] Akour M., Abuwardih L., Alhindawi N., and Alshboul A., “Test Case Minimization using Genetic Algorithm: Pilot Study,” in Proceedings of the 8th International Conference on Computer Science and Information Technology, Amman, pp. 66-70, 2018. DOI: 10.1109/CSIT.2018.8486190

[3] Alhindawi N., Al-Hazaimeh O., Malkawi R., Alsakran J., “A Topic Modeling Based Solution for Confirming Software Documentation Quality,” International Journal of Advanced Computer Science and Applications, vol. 7, no. 2, 2016. DOI: 10.14569/IJACSA.2016.070227

[4] Armstrong-Mensah E., Ramsey-White K., Yankey B., and Self-Brown S., “Covid-19 and Distance Learning: Effects on Georgia State University School of Public Health Students,” Frontiers in Public Health, vol. 8, pp. 1-10, 2020. DOI: 10.3389/fpubh.2020.576227

[5] Conn S., Gartner 2020 Hype Cycle for Supply Chain Strategy Shows Internet of Things is Two to Five Years Away from Transformational Impact, Last Visited, 2022.

[6] Gandhi C., Suri G., Golyan R., Saxena P., and Saxena B., “Packet Sniffer-A Comparative Study,” International Journal of Computer Networks and Communications Security, vol. 2, no. 5, pp. 179-187, 2014.

[7] Hasan M., “State of IoT 2022: Number of Connected IoT Devices Growing 18% to 14.4 Billion Globally,” IoT Analytics, vol. 7, 2022.

[8] Impey C. and Formanek M., “MOOCS and 100 Days of Covid: Enrollment Surges in Massive Open Online Astronomy Classes during the Coronavirus Pandemic,” Social Sciences and Humanities Open, vol. 4, no. 1, pp. 100177, 2021.

[9] Lee I., “Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management,” Future Internet, vol. 12, no. 9, pp. 157, 2020.

[10] Liu S., Zhang C., and Chen Y., “Scheduling Optimization of Real-Time IOT System Based on RNN,” in Proceedings of the International Conference on Intelligent Computing and Human- Computer Interaction, Sanya, pp. 249-253, 2020. DOI: 10.1109/ICHCI51889.2020.00061

[11] Ma S., Zhu M., Wang L., Shu L., Li S., and Huang S., “A Remote Monitoring System of IDC Room Based on ZigBee Wireless Sensor Networks,” in Proceedings of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, Chengdu, pp. 782-787, 2009. DOI: 10.1109/DASC.2009.143

[12] Malkawi R., SaifanA., Alhendawi N., Bani Ismaeel A., “Data Mining Tools Evaluation Based on their Quality Attributes,” International Journal of Advanced Science and Technology, vol. 29 , no. 3, pp. 13867-13890, 2020. 914_Data_Mining_Tools_Evaluation_Based_on_ their_Quality_Attributes

[13] Mazur D., Entzminger R., Morell P., Kay J., and Syme E., “Defining the Industrial Demilitarized Zone and its Benefits for Mining Applications,” in Proceedings of the IEEE Industry Applications Society Annual Meeting, Addison, pp. 1-7, 2015. DOI: 10.1109/IAS.2015.7356901

[14] Meqdadi O., Alhindawi N., Alsakran J., Saifan A., and Migdadi H., “Mining Software Repositories for Adaptive Change Commits Using Machine Learning Techniques,” Information and Software Technology, vol. 109, pp. 80-91, 2019.

[15] Mraz L., Komosny D., Cervenka V., Mor1avek P., and Simek M., “Open-Packet Analyzer Platform for Wireless Sensor Networks Based on IEEE 802.15.4,” in Proceedings of the 34th International Conference on Telecommunications and Signal Processing, Budapest, pp. 145-149, 2011. DOI:10.1109/TSP.2011.6043754

[16] Nahar K., Alhindawi N., Al-Hazaimeh O., Al- Khatib R., and Al-Akhras A., “NLP and IR Based Solution for Confirming Classification of Research Papers,” Journal of Theoretical and Applied Information Technology, vol. 96, no. 16, pp. 5269-5279, 2018.

[17] Robinson A., Kerski J., Long E., Luo H., DiBiase D., and Lee A., “Maps and the Geospatial Revolution: Teaching a Massive Open Online Course (MOOC) in Geography,” Journal of Geography in Higher Education, vol. 39, no. 1, pp. 65-82, 2015.

[18] Sonwalkar N., “MOOCs FORUM September,” vol. 1, no. P, pp. 22-29, 2013. doi:10.1089/mooc.2013.0007.

[19] Sree H., Pavithra R., Nithyaa Shri R., and Shanthi M., “Review on IoT Security and its Real-time Application,” in Proceedings of the International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation, Coimbatore, pp. 1-6, 2021. DOI: 10.1109/ICAECA52838.2021.9675718

[20] Talebkhah M., Sali A., Marjani M., Gordan M., Hashim S., and Rokhani F., “IoT and Big Data Applications in Smart Cities: Recent Advances, IoT Based Technique for Network Packet Analyzer 685 Challenges, and Critical Issues,” IEEE Access, vol. 9, pp. 55465-55484, 2021. DOI: 10.1109/ACCESS.2021.3070905

[21] Wang S. and Yan H., “Design of Real-time Monitoring Platform for Internet of Things Based on Cloud Platform,” in Proceedings of the IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, pp. 61-64, 2020. DOI: 10.1109/ITOEC49072.2020.9141881

[22] Webb Karen., Building Cisco Multilayer Switched Networks, (2000).

[23] Wu D., Xu H., Jiang Z., Yu W., Wei X., and Lu J., “EdgeLSTM: Towards Deep and Sequential Edge Computing for IoT Applications,” IEEE/ACM Transactions on Networking, vol. 29, no. 4, pp. 1895-1908, 2021. DOI: 10.1109/TNET.2021.3075468

[24] Wu H., Han H., Wang X., and Sun S., “Research on Artificial Intelligence Enhancing Internet of Things Security: A Survey,” IEEE Access, vol. 8, pp. 153826-153848, 2020. DOI: 10.1109/ACCESS.2020.3018170.

[25] Yahyaoui A., Lakhdhar H., Abdellatif T., and Attia R., “Machine Learning Based Network Intrusion Detection for Data Streaming IoT Applications,” in Proceedings of the 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD- Winter), Ho Chi Minh City, pp. 51-56, 2021. DOI: 10.1109/SNPDWinter52325.2021.00019

[26] Zappatore M., Longo A., Martella A., Di Martino B., Esposito A., Gracco S., “Semantic Models for IoT Sensing to Infer Environment-Wellness Relationships,” Future Generation Computer Systems, vol. 140, pp. 1-17, 2023.

[27] Zhao L., Brandao Machado Matsuo I., Zhou Y., and Lee W., “Design of an Industrial IoT-Based Monitoring System for Power Substations,” IEEE Transactions on Industry Applications, vol. 55, no. 6, pp. 5666-5674, 2019. DOI: 10.1109/TIA.2019.2940668