An Approach To Detect Packets Using Packet Sniffing: Rupam, Atul Verma, Ankita Singh
An Approach To Detect Packets Using Packet Sniffing: Rupam, Atul Verma, Ankita Singh
3, June 2013
ABSTRACT
In the past decades computer network have kept up growing in size, complexity and along with it the number of its user is also being increased day by day. Hence the amount of network traffic flowing at each node has increased drastically. So to keep a track on these nodes a packet sniffer is used. Sometimes a packet sniffer is called a network monitor or network analyzer. Many system administrator or network administrator use it for monitoring and troubleshooting network traffic. Packet sniffers are useful for both wired and wireless networks. The purpose of this paper is to show the basics of packet sniffer, how it works in both switched and non switched environment, its practical approach, its positive vs negative aspects and its safe guards.
KEYWORDS
Network monitor, switched environment, non switched environment, promiscuous mode, spoofing and intrusion.
1. INTRODUCTION
Packet sniffing is defined as a technique that is used to monitor every packet that crosses the network. A packet sniffer is a piece of hardware or software that monitors all network traffic [3]. Using the information captured by the packet sniffers an administrator can identify erroneous packets and use the data to pinpoint bottlenecks and help to maintain efficient network data transmission [2]. For most organizations packet sniffer is largely an internal threat. Packet sniffers can be operated in both switched and non switched environment. [4] Determination of packet sniffing in a non switched environment is a technology that can be understand by everyone. In this technology all hosts are connected to a hub. There are a large number of commercial and non commercial tools are available that makes possible eavesdropping of network traffic. Now a problem comes that how this network traffic can be eavesdrop; this problem can be solved by setting network card into a special promiscuous mode. [4] Now businesses are updating their network infrastructure, replacing aging hubs with new switches. The replacement of hub with new switches that makes switched environment is widely used because it increases security. However, the thinking behind is somewhat flawed. It cannot be said that packet sniffing is not possible in switched environment. It is also possible in switched environment.
DOI : 10.5121/ijcses.2013.4302
21
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
When a switched environment is considered then all hosts are connected to a switch instead of a hub, it is called a switched Ethernet also. Since in switched environment packet sniffing is more complex in comparison to non switched network, because a switch does not broadcast network traffic. Switch works on unicast method, it does not broadcast network traffic, it sends the traffic directly to the destination host. This happens because switches have CAM Tables. These tables store information like MAC addresses, switch port and VLAN information [5][6]. [5] To understand working of packet sniffer in switched environment, an ARP cache table is considered. This is a table that stores both MAC addresses and IP addresses of the corresponding hosts. This table exists in local area network. Before sending traffic a source host should have its destination host, this destination host is checked in the ARP cache table. If destination host is available in the ARP cache then traffic will be sent to it through a switch, but if it is not available in the ARP cache then source host sends a ARP request and this request is broadcasted to all the hosts. When the host replies the traffic can be send to it. This traffic is sent in two parts to the destination host. First of all it goes from the source host to the switch and then switch transfers it directly on the destination host. So sniffing is not possible.
There are several methods through which we can sniff traffic in switched environment. These methods are:2.1. ARP Cache Poisoning
ARP Cache Poisoning can be better explained by an example man-in-the-middle-attack.
22
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
Switch X Y
Suppose we have 3 hosts x, y, z. Host x and y are connected through a switch and they normally communicate. Assume that z wants to see the communication between x and y. When, x sends traffic which is destined for y it is intercepted by z. z passes this information on to y, pretending that it came from x. This is achieved by ARP Cache Poisoning.
3. SNIFFING METHODS
Three types of sniffing methods are used. These are:
23
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
4. PRACTICAL APPROACH
A practical approach of this title is developed by us in which we have shown actual packet capturing. This approach is mostly developed for: 1. To make data identity stealing available by tracing the packets from the network. 2. To provide an easy and effective way of sniffing of data packets. 3. To provide a user friendly environment. 4. It is possible only when the server code is running.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
Feasibility analysis is also an important part of system analysis. We should have to know that our system is feasible in the following environment or not. These environments include Technical feasibility, operational feasibility and economical feasibility. Technical feasibility, that is commonly known to all that the desired system that we are going to develop should be technically feasible. Operational feasibility indicates that systems operation will be properly used or not. So as like technical and operational feasibility economical feasibility indicate that is it possible to develop the system in our desired budget.
25
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
All incoming and outgoing packets time, its protocol analysis and what it contains source address and what is its destination address and actual size of the packets are shown by this window. Now if we want to know the detailed information of any packet then we choose it, another window opens showing the detailed information of that particular packet.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
Detailed information of packet contains information as like timing of coming of packet, source addresses of the packet, destination addresses of the packet, protocol information, time to live of packets, version information, header length, precedence, Delay information, Throughput, Reliability, Total length of packet, Identification and Checksum along with the contents of the packets.
Now we can edit the content of packet and we can transfer again this modified packet in the network. We can store all packets information in the buffer for further analysis.
27
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
This application may be previously developed but this contains a problem. It is not much feasible for those users who are unknown about the concepts of IP addresses, MAC addresses and promiscuous mode etc. So due to of being unaware they could not understand what is going on exactly. So here we are developing a new concept of providing administrators name also. As we know that in big organization each system are allotted to a particular user. So to keep a track that which activity is performing by which user is possible to know. When a new user uses this application then he can easily understand that a person sitting at system x what is accessing.
5. POSITIVE ASPECT
This application keeps both positive and negative aspects. Its positive aspects can be defined as:
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
Network analyzer can:1. Provide detail information of activities that is going on the network. 2. Test anti-malware programs and pin-point potential vulnerabilities. 3. Detect unusual packet characteristics. 4. Identify packet sources or destination. 5. Configure alarm for defined threat. 6. Search of specific data string in packets. 7. It captures all the information and displays it
Network analyzer is mostly used in comparison to other techniques because it gives assurance to minimize the probability of an attack.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
These checkings are performed by a normal user. COPS then use comparison to determine if any anomalies have occurred. Many security tools that are basically designed for UNIX systems, administrator, programmer, operator or consultant in the neglected area of the computer security are combined to make COPS. [8] There are twelve small security check programs which are integrated by COPS. These programs look for: 1. File directory and device permission/modes. 2. Poor passwords. 3. Security of passwords. 4. Programs and files run in /etc/rc*. 5. Existence of SUID files, their writability. 6. A CRC check against important binaries or key files. 7. Anonymous ftp setup. 8. Unrestricted tftp, decode alias in send mail, SUID uudecode problems, hidden shells. 9. Miscellaneous root checks. 10. Checking dates of CERT advisories versus key files. 11. Writability of users home directories and startup files. 12. The kuang expert system.
6.2. Tripwire
Tripwire is a tool that is basically used for intrusion detection. Each database/system has several files and every modification in these files is monitored by a security utility. This utility is called Tripwire. This monitoring is done by maintaining digital signature of each file. Using these signatures, tripwire checks file integrity. There are many digital signature algorithms that are offered by Tripwire. When Tripwire creates digital signature for important files then this signature is checked against checksums. If a difference is found, it simply means there have been some changes in the files by an intruder.
6.3. Tiger
It is similar to COPS. [9]Tiger is a type of security tool. It is used not only as a security audit but also it is used as an intrusion detection system. Multiple UNIX platforms are supported by tiger. It is freely available and if we want to take it then we should go through the GPL License process. When it is compared from other tool then we get that it needs only of POSIX tools and these tools are written in shell language. Along with various applications it has some interesting features that show its resurrection and this resurrection includes a modular design that is easy to expand and it has a double edge where it can be used as an audit tool and as a host intrusion detection tool. There are many ways in which free software intrusion detection is currently going. These ways goes from network IDS to the kernel but there is a case, that it does not mention file integrity checkers and log checkers. This tool is complemented by tiger and provides a framework for together working. Tiger can be freely downloaded from savannah.
7. NEGETIVE ASPECT
Sniffing programs are found in two forms: Commercial packet sniffer and Underground packet sniffer. Commercial packet sniffer has positive aspect because it is used in maintaining network whereas underground packet sniffer has negative aspect because it is mostly used by attackers to
30
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
gain unauthorized access to remote host [3]. Thus we see that this application has some negative aspects too.
7.3. IP Spoofing
To gain unauthorized access to machines, IP spoofing is a powerful technique. Here an intruder sends messages to a computer with an IP address. And this IP address indicates that the message is coming from a trusted host. This is used for: 1. Reprogramming routers 2. Denial of service attack
8. SAFE GUARDS
There are many ways through which we can protect our packets. One of them is by using encryption. There are three ways to apply encryption on packets.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
8.4. SSL
SSL is nothing, it is secure socket layer that is used to encrypt packet. So that we can be able to get secure channel for database communication or simple mail transfer protocol. We can use something call SSL over http in electronic commerce and E-mail that is HTTPS [10].
8.5. TLS
TLS is nothing, it is transport layer security. It is based on SSL. Here a requirement arises that TLS use the certificates which now a days called web based certificates [10].
Process 1
Process 2
Secure Channel
Figure 8: Security process
9. CONCLUSION
This paper proposes an approach to detect packets through packet sniffing. It includes some negative aspects but besides these negative aspects it is much useful in sniffing of packets. Packet sniffer is not only used for hacking purpose but also it is used for network traffic analysis, packet/traffic monitoring, troubleshooting and other useful purposes. Packet sniffer is designed for capturing packets and a packet can contain clear text passwords, user names or other sensitive material. Sniffing is possible on both non switched and switched networks. We can use some tools to capture network traffic that are further used by researchers. We can conclude that packet sniffers can be used in intrusion detection. There exist some tools also that can be used for intrusion detection. Thus we can say that packet sniffing is a
32
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
technique through which we can create an intrusion and through which we can detect an intrusion.
ACKNOWLEDGEMENT
The special thanks goes to our helpful guide Dr. Atul Verma. The guidance and support that he provided us, helps really in completion of paper. The co-operation is much indeed appreciated. However, it would have not been possible without the kind support and help of our college. We would like to extend our sincere thanks to all of them. We are highly indebted to SRMCEM for their guidance and constant supervision. We would like to express our gratitude towards our friends for their co-operation and encouragements.
REFERENCES
[1] [2] EtherealPacketSniffing,Available:netsecurity.about.com/od/readbookreviews/gr/aapro52304.htm. Pallavi Asrodia, Hemlata Patel, Network traffic analysis using packet sniffer, International Journal of Engineering Research and Application (IJERA), Vol.2, pp. 854-857, Issue 3, May-June 2012. [3] Ryan Splanger, Packet sniffing detection with Anti sniff, University of Wisconsin -Whitewater, May 2003. [4] Tom King, Packet sniffing in a switched environment, SANS Institute, GESC practical V1.4, option 1, Aug 4th 2002, updated june/july 2006. [5] RyanSpangler, Packetsniffingonlayer2switchedlocalareanetworks, PacketwatchResearch:http://www.packetwatch.net, Dec 2003. [6] Sconvery, HackingLayer2:FunwithEthernetSwitches, Blackhat, 2002, Available:http://www.blackhat.com/ presentations/bh-usa-02/bh-us-02-convery-switches.pdf. [7] http://www.monkey.org/dufsong/dsniff/. [8] http://www.fish2.com/cops/overview.html. [9] http://nongnu.org/tiger/. [10] http://www.securityteam.com/unixfocus/Detecting sniffers on your network .html.
Authors
Rupam is a B.tech Final year student of Computer Science department, Sri Ram Swroop Memorial Group of Professional Colleges, affiliated to Uttar Pradesh Technical University.
Dr. Atul Verma is working as an Assistant Professor in the Dept. of Computer in SRMGPC. He has completed his graduation from Integral University. He obtained his Ph.D degree in computer science. He has 6 years of teaching experience.
Ankita Singh is a B.tech Final year student of Computer Science department, Sri Ram Swroop Memorial Group of Professional Colleges, affiliated to Uttar Pradesh Technical University.
33