Skip to main content
Log in

Revisiting computer networking protocols by wireless sniffing on brain signal/image portals

  • Computer aided Medical Diagnosis
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Brain signal/image processing is of significant attention not only the physiologist carrying out analysis and probe and the clinician investigating patients but further to the biomedical engineer who is vital for acquisition, processing, and interpreting the electroencephalogram signals by designing systems and algorithms for their control. The precious, abundant materials or information in the field of brain signal/image processing is distributed in the diverse scientific, technological and physiological periodicals, magazines, journals, international conference proceedings, and also in various portals/databases. Security threats or attacks may happen for a portal using data interruption, information interception, content modification and fabrication with new data. This study interprets the protocol layering information for the captured packets, image reconstruction after sniffing the packets, and the DNS/rDNS response times for a given portal/IP address using a Wireshark open source tool. Also, the security assessment results such as OS fingerprinting and port sweeping on the remote machines are performed using Nmap open source tool. Results are analyzed on specific brain signal/image processing portals around the globe located in USA, UK, and other countries.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24

Similar content being viewed by others

References

  1. Rangayyan Rangaraj M (2016) Biomedical signal analysis, 2nd edn. Wiley, Hoboken

    Google Scholar 

  2. Reddy DC (2005) Biomedical signal processing: principles and techniques. McGraw Hill Education, New York

    Google Scholar 

  3. Almejrad Ali S (2010) Human emotion detection using brainwave signal: a challenging. Eur J Sci Res 44:640–649

    Google Scholar 

  4. Satheesh Kumar J, Bhuvaneswari P (2012) Analysis of electroencephalography (EEG) signals and its categorization—a study. Procedia Eng 38:2525–2536

    Article  Google Scholar 

  5. ftp://apnic.net/apnic/training/face2faceHandouts/bd-security. Accessed 21 July 2018

  6. Ansari S, Rajeev SG, Chandrasekhar HS (2003) Packet sniffing brief introduction. IEEE Potentials 21:17–19

    Article  Google Scholar 

  7. Sandhya S, Purkayastha S, Joshua E, Deep A (2017) Assessment of website security by penetration testing using wireshark. In Proceedings of the 2017 international conference on advanced computing and communication systems (ICACCS–2017), Coimbatore, India

  8. Elamaran V, Arunkumar N, Venkat Babu G, Balaji VS, Gomez J, Figueroa C, Ramirez-Gonzalez G (2018) Exploring DNS, HTTP, and ICMP response time computations on brain signal/image databases using a Packet Sniffer Tool. IEEE Access. https://doi.org/10.1109/access.2018.2870557

  9. Bagyalakshmi G, Rajkumar G, Arunkumar N, Easwaran M, Narasimhan K, Elamaran V, Solarte M, Hernandez I, Ramirez-Gonzalez G (2018) Network vulnerability analysis on brain signal/image databases using Nmap and Wireshark tools. IEEE Access 6:57144–57151

    Article  Google Scholar 

  10. http://www.brainsignals.de. Accessed 19 July 2018

  11. https://en.wikipedia.org/wiki/List_of_neuroscience_databases. Accessed 22 July 2018

  12. http://hendrix.imm.dtu.dk. Accessed 25 July 2018

  13. Matthews J (2005) Computer networking: internet protocols in action. Wiley, Hoboken

    Google Scholar 

  14. Sarkar NI (2006) Teaching computer networking fundamentals using practical laboratory exercises. IEEE Trans Educ 49:285–291

    Article  Google Scholar 

  15. Kurose JF, Ross KW (2017) Computer networking: a top-down approach, 6th edn. Pearson Education, New York

    Google Scholar 

  16. Ndatinya Vivens, Xiao Zhifeng (2015) Network forensics analysis using Wireshark. Int J Sens Netw 10:91–106

    Google Scholar 

  17. http://www.cs.rug.nl/~imaging/databases/retina_database/retinalfeatures_database.html. Accessed 28 July 2018

  18. http://www.insecure.org/nmap. Accessed 1 Sept 2018

  19. Matthews JN (2005) Hands-on approach to teaching computer networking using packet traces. In: ACM Proceedings of the 6th conference on information technology education (SIGITE’05), pp. 361–367

  20. Takahashi D, Xio Y (2008) Retrieving knowledge from auditing log files for computer and network forensics and accountability. Secur Commun Netw 1:147–160

    Article  Google Scholar 

  21. Ackerly T, Geso M, Smith R (2008) Radiotherapy DICOM packet sniffing. Australas Phys Eng Sci Med 31:243–251

    Article  Google Scholar 

  22. Chin CA, Sharma L, Crosby GV (2013) Evaluation of the effect of wireshark-based laboratories in increasing student understanding of learning outcomes in a data communication course. In: Proceedings of the 120th ASEE annual conference & exposition, Atlanta, Georgia

  23. Aburdene MF, Meng X, Mokodean GL (2004) Analysis of computer networks courses in undergraduate computer science, Electrical Engineering and Information Science Programs. In: Proceedings of the 2004 American Society for Engineering Education annual conference & exposition, ASEE

  24. Acharya UR, Hagiwara Y, Deshpande SN, Suren S, En Wei Koh J, Oh SL, Arunkumar N, Ciaccio EJ, Lim CM (2019) Characterization of focal EEG signals: a review. Future Gener Comput Syst 91:290–299

    Article  Google Scholar 

  25. Liu GS, Wang RQ, Yin F, Ogier JM, Liu CL (2018) Fast genre classification of web images using global and local features. CAAI Trans Intell Technol 3(3):161–168

    Article  Google Scholar 

  26. Zhou Y, Sun Q, Liu J (2018) Robust optimisation algorithm for the measurement matrix in compressed sensing. CAAI Trans Intell Technol 3(3):133–139

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Elamaran.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sathishkumar, B.R., Sundaravadivazhagan, B., Martin, B. et al. Revisiting computer networking protocols by wireless sniffing on brain signal/image portals. Neural Comput & Applic 32, 11097–11109 (2020). https://doi.org/10.1007/s00521-018-3919-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-018-3919-x

Keywords

Navigation