An Insight in To Network Traffic Analysis Using Packet Sniffer
An Insight in To Network Traffic Analysis Using Packet Sniffer
39
International Journal of Computer Applications (0975 – 8887)
Volume 94 – No 11, May 2014
capture traffic without having to install Wireshark on the the switch and the server, as illustrated in Fig 3. This is a
server. MitM (Man in the Middle), at the physical level, where he has
a passive access to all traffic throughput. There are several
3.1 Using a Hub ways in which the user can configure his PC in this mode.
If a user connects a node where Wireshark is installed to one More so, it is easy to install and configure bridge-utils (bridge
of the switch ports, he will only see the packets that occur packet utilities for Linux). This is necessary to create a
between the switch and his terminal, however this is not bridge-type interface and thereafter add the physical interfaces
desired for traffic analysis. The switch divides the network that form part of this bridge. Lastly, users can activate the
into segments creating separate collision domains for each interface and execute Wireshark. The disadvantage of this
port. Unlike a collision domain, in a broadcast domain, the capture method is the loss of data streams during installation.
packets are sent to all ports (belonging to the same Virtual
LAN -VLAN). This objective is met using a hub, as
illustrated in Fig 1, connecting the hub- a broadcast device to
the same network segment on the user’s server. Now all
traffic between the switch and the server can be analyzed on
the user’s terminal, where Wireshark is installed.
40
International Journal of Computer Applications (0975 – 8887)
Volume 94 – No 11, May 2014
41
International Journal of Computer Applications (0975 – 8887)
Volume 94 – No 11, May 2014
42
International Journal of Computer Applications (0975 – 8887)
Volume 94 – No 11, May 2014
ICMP transit attacks, Direct Attacks, TTL expiry attack, and can be found under the tab Statistics -> TCP Stream
Reflection Attacks etc. They are very difficult to analyze due Graph [12]. Under ideal conditions, the graph represents a
to the high volume of traffic involved. Many devices that line growing over time indicating efficient performance the
enable to stop these attacks are expensive. Contacting the ISP TCP connection [13]. However, in some scenarios there will
seems the most appropriate action to monitor such attacks. be gaps and bumps that intervene the continuity of the line.
However, when the magnitude of attack is not very excessive, This occurs due to a resend of data as result of lost ACK
an appropriate configuration of the operating system and duplications, segments retransmissions due to packet loss,
kernel services could help to counteract the attack. For expired timeouts etc. This graph can be extremely beneficial
example, there are various Linux kernel parameters that to detect irregularities in the behavior of TCP data flow.
enable to modify the traffic behavior which are very useful to Another graph that gives valuable information about network
protect the server from these attacks. traffic is the one on input/output. It can be found in Statistics -
> I/O Graph. Users can select various filters based on which
5.4 DHCP AND DNS SPOOF they want to filter the data. It gives the graphical
An interesting feature of the DHCP protocol is that it does not representation of various filters in different colors. A concise
have authentication mechanisms which enable to verify the data on the percentage of use of each protocol captured can be
source of the packets during the exchange of configuration obtained under Statistics -> Protocol Hierarchy, where the
parameters. In this kind of attack, the hacker can access hierarchy and precedence of each protocol, sent/received
a network traffic by falsifying responses that is sent by an packets and their size are shown.
authentic DHCP server. It allows a hacker to monitor and
sniff all the traffic. All the data packets in the LAN cross the
attacker’s interface which makes it vulnerable to packet
capturing. Giving a brief description how DHCP Spoofing
occurs, when a client sends a DHCP request on the network,
this request is broadcasted and all hosts on the LAN receive it.
Only the DHCP server is aware of the actual meaning of this
request. In the normal functioning, the real DHCP server
replies to the client with its IP address, Subnet mask and
Default Gateway. The attacker in the network simulates a
DHCP server on its host PC. With this, the attacker can reply
to DHCP request before the actual DHCP server. It configures
the client host with not only the IP address of that subnet but
in addition, it also gives the host a false Default Gateway
address and sometimes even a false DNS server address. In
this manner, the attacker redirects all the data packets of the
client host to himself [7]. The hacker later on forwards the Fig 8: Stevens (Time/ Sequence )Graph in Wireshark
frames from client host to real destinations in order to make
the client communication possible. The essence of this attack
is that the client never knows that his communication is
always going through the attacker PC and that the attacker is
actually sniffing all the frames.
43
International Journal of Computer Applications (0975 – 8887)
Volume 94 – No 11, May 2014
affect the network. Network analysts must look into methods 9. ACKNOWLEDGMENTS
so that Wireshark can predict the flow of data streams. Sincere thanks to the professors of the Department of
Electronics and Communication and the department of
8. CONCLUSION Information and Communication Technology for providing
Wireshark is one of the many packet sniffing software that are excellent laboratory facilities to carry out the experimental
available today. It was chosen as the tool to discuss detailed methodology using Wireshark listed under the paragraph
analysis of network traffic due to its advantages mentioned ‘EXPERIMENTAL METHODOLOGY’
under the paragraph ‘AN OVERVIEW OF WIRESHARK’.
Just to summarize, Wireshark is a useful tool that offers 10. REFERENCES
countless functions that help to analyze multiple network [1] Wireshark Documentation:
problems; those caused by poor network configuration or http://www.wireshark.org/docs/wsug_html_chunked/inde
device failures and also a variety of external and internal LAN x.html
attacks. The first step in resolving network problems consists [2] Stolze M, Pawlitzek R and Hild S (2009a) Task Support
of analyzing where the problem has occurred in a network and for Network Security Monitoring. In ACM CHI
what has led to performance loss. Network administrators Workshop on System Administrators Are Users, Too:
should be aware of the importance of using this type of tool, Designing Workspaces for Managing Internet-Scale
as it is a key utility to detect the source of network problems Systems.
that would otherwise take a great deal of resources and time to
[3] Madsen, P., Koga, Y., Takahashi, K.: Federated identity
discover.
management for protecting users from ID theft
Packet sniffers like Wireshark can be a boon for network Proceedings of the 2005 workshop on Digital identity
monitoring, but sometimes it is necessary to prevent packet management Fairfax, VA, USA (2010) 77-83
sniffers from collecting sensitive information like passwords, [4] Gouda, M.G., Liu, A.X., Leung, L.M., Alam, M.A.: Single
in order to maintain security in the IT industry. Two important Password, Multiple Accounts. Proceedings of 3rd
actions that can protect users from packet sniffers and other Applied Cryptography and Network Security Conference
eavesdropping attacks are as follows: First one is (industry track), New York City, New York (2008)
data encryption (hiding). Data encryption helps protect
[5] Riley, S.: Password Security: What Users Know and What
sensitive data and passwords while in transit, packet sniffers
They Actually Do. Usability News, Vol. 2006. Software
merely prove useless, if data is encrypted. Encryption can be
Usability Research Laboratory, Department of
implemented in a number of ways: SSL-Secure socket layer
Psychology, Wichita State University, Wichita (2009)
(HTTPS- where S stands for SSL) connections to Web
servers, encrypted SSL or TLS (Transport Layer Security) [6] 2010 18th IEEE Symposium on High Performance
connections to mail servers, or other application-specific Interconnects Innovating in Your Network with
techniques. Alternatively, a virtual private network (VPN) can OpenFlow: A Hands-on Tutorial
be used to encrypt entire communications links, regardless of [7] 2011 Fourth International Joint Conference on
protocol. Second one being use of a switched network. In this Computational Sciences and Optimization: Application
case, a packet sniffer will only be able to capture data stream Design of Data Packet Capturing Based on Sharpcap
packets arriving on its own local switch port. If each system is [8] The 6th International Conference on Computer Science &
assigned to an individual switch port, there simply won't be Education (ICCSE 2011) August 3-5, 2011. SuperStar
any packets for the packet sniffer to intercept. Virgo, Singapore: Application of Mini Case Study in
Network traffic analysis is of prime importance in any Computer Networks
organization. In such a highly IT driven generation, if the [9] Andrew S. Tanenbaum, “Computer Networks.” 4th ed.
network is slow/ down even for a few minutes, it can incur Beijing: Tsinghua University Press, 2004, pp.41.
huge losses to the company. Hence it is important to analyze [10] IEEE 2008 publication: Bottleneck Analysis of Traffic
networks and be aware of the network threats beforehand. Monitoring using Wireshark
Network analyzers like Wireshark are cost effective and a
very useful tool for in depth network analysis. This is a [11] I. Kim, J. Moon, H. Y. Yeom, "Timer-Based Interrupt
review paper that describes several ways of analyzing network Mitigation for High Performance Packet Processing," in
traffic with Wireshark, with the help of practical examples. Proc. 5th International Conference on High-Performance
The paper also discusses some common attacks that can Computing, (Asia-Pacific Region, 2011).
threaten local area networks and appropriate measures to [12] J. Cleary, S. Donnelly, I. Graham, "Design Principles for
mitigate the impact of these attacks on the network. This Accurate Passive Measurement in Networks," in Proc.
paper can be extremely beneficial to a novice who wishes to PAM2000 Passive and Active Measurement Workshop
have a detailed monitoring of his network. Starting with a (Apr. 2000).
brief description about Wireshark, then moving on to ways to [13] Traffic Analysis with Wireshark, February 2011, Author:
capture data under different circumstances and finally Borja Merino Febrer, The National Communications
discussing various attacks that can affect a network (with their Technology Institute (Instituto Nacional de Tecnologías
proposed solutions), this paper has it all. Lastly, the paper de la Comunicación - INTECO) Manuel Belda, from
describes how to use graphs in Wireshark to interpret the Valencia's Computer Security Incident Response Team
benefits and efficiency of the network. The paper also talks (CSIRT-cv) and Eduardo Carozo Blumsztein from the
about some of the security issues related to Wireshark and ANTEL CSIRT of Uruguay.
suggests solutions for the same. Wireshark, apart from being
[14] Di Guangqun, Hu Guijang. “Development and
one of the best protocol analyzers today, is an excellent source
implementation of packet sniffer”, CNKI: SUN:
of knowledge for any IT professional, network analyst or
WJSJ.0.2009-21- 082.pp.1-5, 2009
communications enthusiast.
IJCATM : www.ijcaonline.org
44