A Comparative Study Between Wireshark and Paessler Router Traffic Grapher (PRTG) in Network Monitoring and Analysis
Network traffic analysis (NTA) plays a major role for monitoring network performance, improving security, and guaranteeing operational efficiency across sectors. This study compares two popular network analysis tools, Wireshark and Paessler Router Traffic Grapher (PRTG), that handle distinct area...
| Main Authors: | Anis Nariesha, Alizan, Mohamad Fadli, Zolkipli |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
INTI International University
2024
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/2107/ http://eprints.intimal.edu.my/2107/2/645 http://eprints.intimal.edu.my/2107/3/ij2024_51r.pdf |
Similar Items
Router remote monitoring using android application
by: Chong, Jian Dong
Published: (2014)
by: Chong, Jian Dong
Published: (2014)
Development of status monitoring for routers and switches / Hairul Redzuan Saring
by: Saring, Hairul Redzuan
Published: (2007)
by: Saring, Hairul Redzuan
Published: (2007)
Using routers and honeypots in combination for collecting Internet worm attacks
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Analysis on Differential Router Buffer Size towards Network Congestion: A Simulation-based
by: Nahar, H., et al.
Published: (2011)
by: Nahar, H., et al.
Published: (2011)
X-Slot microstrip patch antenna for Sub-6 Ghz 5G router applications
by: Amir Farhan, Asri, et al.
Published: (2025)
by: Amir Farhan, Asri, et al.
Published: (2025)
Present Status and Challenges in Cloud Monitoring Framework: A Survey
by: Jaber, Aws Naser, et al.
Published: (2016)
by: Jaber, Aws Naser, et al.
Published: (2016)
Network traffic monitoring system with approach (NTMs) / Lee Chin Han
by: Lee , Chin Han
Published: (2004)
by: Lee , Chin Han
Published: (2004)
Comparative study between traffic control methods
Using simulation software
by: Taha Alshaikhli , Imad Fakhri, et al.
Published: (2013)
by: Taha Alshaikhli , Imad Fakhri, et al.
Published: (2013)
Impact of Redhat IPv6 router on heterogeneous host connections
by: Syed Mohamed, Sulaiman, et al.
Published: (2007)
by: Syed Mohamed, Sulaiman, et al.
Published: (2007)
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
by: Ali, Mohammed Hasan, et al.
Published: (2019)
by: Ali, Mohammed Hasan, et al.
Published: (2019)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
The performance evaluation of link-sharing method of buffer in NoC router
by: Fukase, Naohisa, et al.
Published: (2013)
by: Fukase, Naohisa, et al.
Published: (2013)
A Conceptual Model Using The Elliptic Curve Diffie–Hellman With An Artificial Neural Network Over Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2016)
by: Jaber, Aws Naser, et al.
Published: (2016)
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
by: A. Ahmed, Hussam, et al.
Published: (2018)
by: A. Ahmed, Hussam, et al.
Published: (2018)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
A Survey on Balancing Data Loss Prevention (DLP) with User Privacy in a
Data-Driven World
by: Nurhafizah, Ahmad Zaini, et al.
Published: (2024)
by: Nurhafizah, Ahmad Zaini, et al.
Published: (2024)
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024)
by: Menaga, Segar, et al.
Published: (2024)
The proposal of partial sharing for link-sharing method of buffer in NoC router
by: Fukase, Naohisa, et al.
Published: (2014)
by: Fukase, Naohisa, et al.
Published: (2014)
Traceback Model for Identifying Sources of Distributed
Attacks in Real Time
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
An interface of wireless network traffic analysis
by: Mohamed Almoustafa, Ahmad Mohamed Jamil
Published: (2007)
by: Mohamed Almoustafa, Ahmad Mohamed Jamil
Published: (2007)
Implementation traffic control and traffic shaping in linux using web approach / Eric Ng Kang Yin
by: Eric Ng, Kang Yin
Published: (2004)
by: Eric Ng, Kang Yin
Published: (2004)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Implementation of dynamic fuzzy logic control of traffic
light with accident detection and action system using iTraffic simulation
Simulation
by: Alkandari, Abdulrahman, et al.
Published: (2018)
by: Alkandari, Abdulrahman, et al.
Published: (2018)
Traffic engineering IP/GMPLS over WDM
by: Shaaya, Sharifah Azwa
Published: (2005)
by: Shaaya, Sharifah Azwa
Published: (2005)
Development of GPU-based visual environment for metamaterials design
by: Mezhuyev, Vitaliy, et al.
Published: (2018)
by: Mezhuyev, Vitaliy, et al.
Published: (2018)
Network and traffic engineering in emerging distributed computing applications
by: Abawajy, Jemal H., et al.
Published: (2013)
by: Abawajy, Jemal H., et al.
Published: (2013)
Comparison of TCP Variants Over Self-Similar Traffic
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
Performance of transmission control protocol on self-similar traffic.
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
The performance evaluation of 3D torus using link-sharing method in NoC router
by: Fukase, Naohisa, et al.
Published: (2016)
by: Fukase, Naohisa, et al.
Published: (2016)
Pseudo Random Bits' Generator Based on Tent Chaotic Map and Linear Feedback Shift Register
by: Ahmed, Hussam Alddin S., et al.
Published: (2018)
by: Ahmed, Hussam Alddin S., et al.
Published: (2018)
Development of MPLS test-bed for network traffic engineering
by: Jusoh @ Tajudin, Mohd. Taufik
Published: (2005)
by: Jusoh @ Tajudin, Mohd. Taufik
Published: (2005)
Traffic Information System Kuala Lumpur / Tay Tick Seng
by: Tay , Tick Seng
Published: (2003)
by: Tay , Tick Seng
Published: (2003)
Traffic management system based on wsn in Kuwait: an initial design
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Filtration Model for the Detection of Malicious Traffic in Large-Scale Networks
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
Control of a complex traffic junction using fuzzy inference
by: Yusof, Rubiyah, et al.
Published: (2004)
by: Yusof, Rubiyah, et al.
Published: (2004)
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)
by: M. N. M., Kahar, et al.
Published: (2007)
A cost and delay estimation of a suite of low-cost adaptive routers for hierarchical torus network
by: Rahman, M.M. Hafizur, et al.
Published: (2012)
by: Rahman, M.M. Hafizur, et al.
Published: (2012)
Maldroid- attribute selection analysis for malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2019)
by: Rahiwan Nazar, Romli, et al.
Published: (2019)
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
by: Iftikhar , Ahmad
Published: (2019)
by: Iftikhar , Ahmad
Published: (2019)
Traffic Utilization on Internet Application: Trends and Impact in Student Wireless Network
by: Noraniah, Abdul Aziz, et al.
Published: (2014)
by: Noraniah, Abdul Aziz, et al.
Published: (2014)
Similar Items
-
Router remote monitoring using android application
by: Chong, Jian Dong
Published: (2014) -
Development of status monitoring for routers and switches / Hairul Redzuan Saring
by: Saring, Hairul Redzuan
Published: (2007) -
Using routers and honeypots in combination for collecting Internet worm attacks
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014) -
Analysis on Differential Router Buffer Size towards Network Congestion: A Simulation-based
by: Nahar, H., et al.
Published: (2011) -
X-Slot microstrip patch antenna for Sub-6 Ghz 5G router applications
by: Amir Farhan, Asri, et al.
Published: (2025)