0% found this document useful (0 votes)
33 views6 pages

An Insight in To Network Traffic Analysis Using Packet Sniffer

This document discusses using the packet sniffer Wireshark to analyze network traffic and detect attacks. It presents 3 methods for capturing traffic with Wireshark: 1) Using a hub to connect to the network segment between a switch and server to monitor all traffic. 2) Installing a network interface card in promiscuous mode on the user's machine to sniff traffic. 3) Creating a bridge interface to passively monitor traffic in a man-in-the-middle configuration without interrupting data streams. The goal is to help network administrators detect problems like performance issues, attacks spoofing ARP or DNS, and denial of service attacks using a free packet analysis tool.

Uploaded by

Jonathan Jaeger
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views6 pages

An Insight in To Network Traffic Analysis Using Packet Sniffer

This document discusses using the packet sniffer Wireshark to analyze network traffic and detect attacks. It presents 3 methods for capturing traffic with Wireshark: 1) Using a hub to connect to the network segment between a switch and server to monitor all traffic. 2) Installing a network interface card in promiscuous mode on the user's machine to sniff traffic. 3) Creating a bridge interface to passively monitor traffic in a man-in-the-middle configuration without interrupting data streams. The goal is to help network administrators detect problems like performance issues, attacks spoofing ARP or DNS, and denial of service attacks using a free packet analysis tool.

Uploaded by

Jonathan Jaeger
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

International Journal of Computer Applications (0975 – 8887)

Volume 94 – No 11, May 2014

An Insight in to Network Traffic Analysis using Packet


Sniffer

Jhilam Biswas Ashutosh


8th semester, Department of Electronics and 8th semester, Department of Electronics and
Communication, Manipal Institute of Technology, Communication, Manipal Institute of Technology,
Manipal, Karnataka, India Manipal, Karnataka, India

ABSTRACT into sections that demonstrate different real attacks to local


Slowdown in the network performance can cause serious networks, such as ARP Spoof, DHCP Flooding, DNS Spoof,
concern to network analysts, leading to loss in resources. Such DDoS Attacks, Port Monitoring, etc. Wireshark is used as the
cases are not easy to deal with, due to the lack of time and main support tool to help detect and analyze the problems
resources available. Lack of awareness about appropriate tools generated by these attacks. At the same time, different
which detect the attacks or not knowing exactly why a loss in solutions to resolve each of these attacks are proposed.
network performance is occurring are some other factors.
Connectivity loss or shutting down of terminals within the 2. AN OVERVIEW OF WIRESHARK
network for unknown reasons are among the other problems. Wireshark is a free and open-source protocol/ packet tracer. It
Mostly, the cause of these problems cannot be detected runs on both Windows and Unix platforms. Formerly known
accurately and is concluded due to poor network architecture, as Ethereal, its prime objective is network troubleshooting,
such as inefficiently configured broadcast storms, spanning- analysis, and networking research. Wireshark facilitates a
tree, usage of unsuitable routing protocols within the network wide range of filters that supports over 1200 protocols
domain, redundant links etc. However, sometimes the cause (version 1.10.7), all with a simple front-end that enables one
could be due to attacks by unknown third parties that try to to break down the captured packets on the basis of different
put the web server out-of-service through means of a DoS layers of the OSI (Open Systems Interconnection) model. The
(Denial of Service) attack, sending traffic with a poisoned Wireshark engine can decipher the structure of different
ARP in an attempt to discover hosts to infect, or by simply networking protocols. This feature proves extremely
infecting ports with malware to form part of an alien network beneficial for users to view the fields of each one of the
or botnet. In all these cases, knowing the source of the attack headers and layers of the packets being analyzed [1]. Thus
is the first step towards taking appropriate action and Wireshark provides a wide range of options to network
achieving correct protection. That is when packet sniffers can engineers when performing certain traffic auditing tasks.
be extremely useful to detect, analyze and map traffic. Such Many tools, such as Snort, OSSIM and a number of IDS/IPS
packet sniffers identify threats to the network and limit their serve to warn users of some of the network related problems
harmful consequences. and attacks. However, when one needs to analyze traffic in
depth or monitor a network, when time is of prime
General Terms importance, these tools lack the flexibility that a protocol
Packet sniffers, Wireshark, Data capturing techniques, LAN analyzer such as Wireshark easily offers.
attacks, graphical usage of Wireshark
3. FIRST STEP OF NETWORK
Keywords
Packet sniffing tools, Wireshark, LAN attacks ANALYSIS: DISCUSSION ON WHERE
TO CAPTURE THE DATA
1. INTRODUCTION The very first step in auditing networks is to define where to
Many sophisticated systems such as the MARS (Monitoring, analyze the traffic. Taking a common scenario for analysis,
Analysis and Response System) by Cisco or IDS/IPS the following assumptions were made. There is a switched
(Intrusion Detection System/Internet Protocol System) help in network made up of a number of switches, several terminals
identifying potential threats to a network. However, these and a file server. Network performance has dropped, however
solutions are not cost effective to any organization/company. the cause is unknown. There is no IDS (Intrusion Detection
An alternative solution is to use a packet sniffing software System) that can alarm or inform about attacks or network
which gives a detailed examination of the network. Examples malfunction. Also, it is known that there are no problems with
of such packet sniffers are Wireshark, Capsa Network the transfer rate of the file server to LAN (Local Area
Analyzer, SkyGrabber, Xplico, Microsoft Network Monitor Network) terminals [3]. Furthermore, network equipment does
etc. not have Netflow protocols to analyze traffic remotely.
The aim of this paper is to make network administrators and Wireshark was chosen to analyze the above scenario. The first
technicians aware of the advantages of monitoring the doubt which arises is where to install Wireshark. It would
network with a packet sniffer using the free and open source seem logical to install Wireshark on the file server itself to
tool Wireshark. All packet sniffing tools work similar to analyze the traffic that flows through this network segment.
Wireshark, hence Wireshark was chosen for experimental However, there could be situations in which there is no access
purposes in this paper. Other packet sniffing tools can be used to the server physically or quite simply for security reasons.
too. The paper also offers practical examples of common Thus, Wireshark cannot be installed there. Some alternatives
attacks to local area networks (LANs) and how Wireshark can are provided in the following paragraphs that enable to
be used to detect these attacks. Further, this paper is divided

39
International Journal of Computer Applications (0975 – 8887)
Volume 94 – No 11, May 2014

capture traffic without having to install Wireshark on the the switch and the server, as illustrated in Fig 3. This is a
server. MitM (Man in the Middle), at the physical level, where he has
a passive access to all traffic throughput. There are several
3.1 Using a Hub ways in which the user can configure his PC in this mode.
If a user connects a node where Wireshark is installed to one More so, it is easy to install and configure bridge-utils (bridge
of the switch ports, he will only see the packets that occur packet utilities for Linux). This is necessary to create a
between the switch and his terminal, however this is not bridge-type interface and thereafter add the physical interfaces
desired for traffic analysis. The switch divides the network that form part of this bridge. Lastly, users can activate the
into segments creating separate collision domains for each interface and execute Wireshark. The disadvantage of this
port. Unlike a collision domain, in a broadcast domain, the capture method is the loss of data streams during installation.
packets are sent to all ports (belonging to the same Virtual
LAN -VLAN). This objective is met using a hub, as
illustrated in Fig 1, connecting the hub- a broadcast device to
the same network segment on the user’s server. Now all
traffic between the switch and the server can be analyzed on
the user’s terminal, where Wireshark is installed.

Fig 3: Capture Mode 3- A Bridge setup (Man in the


middle) where he has access to the traffic throughput.

3.4 Arp Spoof


On certain occasions, if network administrators cannot use the
previous methods, they can use the ARP Spoofing technique.
This is rather an offensive method and is only useful in non-
critical environments where there is a need to capture traffic
Fig 1: Capture Mode 1- A hub connectivity between the between various machines. What is achieved from this
server and the user’s terminal where Wireshark is method, is that the machine which the user wants to monitor
installed. sends all segments via his PC where he has Wireshark
executing. The process is performed by infecting the cache of
3.2 Port Mirroring or VACL (VLAN-Based the machine with a false IP/MAC association [7]. Some
switches have functions available that enable to detect this
ACLS) process (Dynamic ARP Inspection and DHCP Snooping3), so
As long as the user has access to the switch, this is the most it is important to deactivate this function in the network
convenient method to capture network traffic. This way of devices so that the port does not go into shutdown mode.
working is known as Services and Protocols for Advanced
Networks (SPAN). It enables the user to duplicate the traffic
between one or more switch ports and mirror it to the port that
he wants, as shown in Fig 2. In this method, the port
configured as mirroring has to be as fast as the port(s) to be
monitored to avoid packet loss, while data capturing. This
method is used by many administrators to install IDS or other
analysis tools [5]. The advantage which Port Mirroring has,
that it allows better filtering algorithms when specifying the Fig 4: Capture Mode 4- ARP Spoofing connection setup
traffic that he wants to analyze. When configuring Port and flow of data within the connectivity.
Mirroring, it is possible to redirect traffic from one port or
VLAN to another. Also, with VACL it is possible to specify
ACLs to select the type of traffic that the user is interested in.
3.5 Remote Packet Capture
Besides the above methods, there are several options for
capturing data remotely. One of them is by means of a
RPCAP (Remote Packet Capture System). ). In this technique,
in addition to a client program from which the data will be
recovered and viewed; in this case, Wireshark, it is necessary
to execute a server program (rpcapd) along with the required
libraries on the machine. As like ARP Spoofing, this method
Fig 2: Capture Mode 2- Port Mirroring connection setup, is appropriate for non-critical environments where the user
enables to duplicate traffic between various switch ports can install the software in the machine whose traffic he wishes
to analyze, with the associated stability and performance risks.
3.3 Bridge Mode Users can specify the listening port and other options such as
If the user is not able to access the switch, he can use a
authentication, authorized client lists to connect to the server.
machine with two network cards to position himself between

40
International Journal of Computer Applications (0975 – 8887)
Volume 94 – No 11, May 2014

Fig 5: Wireshark interface, data capture

4. EXPERIMENTAL METHODOLOGY 5.1 ARP Spoofing With a Practical


Wireshark was first installed on the system depending on the Example
operating system. Next going to the settings of the web Besides being a method of capturing network traffic in
browser, the homepage was set to blank. Wireshark was specific circumstances, Arp Spoofing is normally used by
opened on the system and data capturing was started. A attackers to intervene between one or more machines with the
snapshot of the captured data using Wireshark is shown in Fig aim of intercepting and modifying stream of data packets.
5.The following offers a brief description of the various areas This is a rather intrusive method of data capturing and is
that are of interest, which Wireshark displays once data reflected in Fig 5.As depicted in the figure, some abnormality
capture starts (Figure 5- Wireshark interface, data capture): is occurring due to the large quantity of ARP traffic that is
Section 1 is the area where filters are defined. These filters being received. A closer look at the behavior of the protocol
enable to view only those data packets or protocols that are of shows that the server is being attacked. From Fig 5, it is seen
interest to the user. Section 2 corresponds to a list to view all that in packet number 5, the machine with IP 10.0.0.101, and
packets being captured in real time. This data (protocol type, a MAC of IntelCor_6e:a2:69, has sent an ARP request to the
number sequence, flags, time stamps, ports, etc.) can be broadcast address asking for the MAC of the IP 10.0.0.1
interpreted to identify the problem without having to perform (user’s network gateway).The router immediately responds
a detailed monitoring. Section 3 enables to classify and with an ARP reply indicating the MAC address. Then the
navigate through the various layers, each header of the same IP repeats the process and requests the MAC of the IP
packets selected in section 2. Lastly, Section 4 represents, the 10.0.0.100 (file server’s IP) using another broadcast diffusion.
packet which was captured by the user’s network card, in The server responds with its MAC address (IntelCor_49: bd:
hexadecimal format. 9). Normal functioning occurs up to this point. The two
devices - a machine on the LAN (10.0.0.101), that has the
5. LOCAL AREA NETWORK (LAN) MAC server and a router, can now share Ethernet traffic. The
ATTACKS problem arises with packet 11, when this machine repeatedly
A client system in a LAN interacts not only with the other sends to the user’s server and the router false ARP reply
client systems within the same LAN but also with the clients packets, associating the IP of both with its own MAC
machines of other LANs. In this process of communication, (IntelCor_6e:a2:69). This way, all traffic transmitted between
the client system is prone to various attacks/ threats. In order the LAN gateway and the server goes through the attacking
to effectively safeguard a LAN from various threats, IT machine [13]. The basic explanation for the above scenario is
managers need to understand the origins of these attacks, the as follows: The ARP protocol is a layer 3 protocol used
methods by which they are detected and the potential risk they to translate IP addresses to physical network card addresses or
present to network resources. The most common types of MAC addresses. When a device tries to access a network
attack along with their mitigation techniques are discussed as resource, it first sends requests to other devices asking for the
follows: MAC address associated with the IP it wants to reach. The
caller will keep the IP - MAC association in its ARP cache, to
speed up new connections to the same IP address. The attack
comes into picture when a particular machine asks the other
machines in the LAN to find the MAC address associated
with an IP address. The attacker machine will answer to the

41
International Journal of Computer Applications (0975 – 8887)
Volume 94 – No 11, May 2014

caller with fake packets saying that the IP address is


associated to its own MAC address and in this way, will build
a real IP - MAC association with the attacked host. This attack
is referred as ARP poisoning or ARP spoofing. This attack is
possible only if the pirate and the victims are within the same
broadcast domain.

5.2 PORT FLOODING


This attack is similar to the previous one, but easier to detect.
In this attack, multiple false segments are sent to a switch port
in order to saturate the switch assignment table. A switch has
an internal memory space called the CAM (Content- Fig 6: Packets captured, generated by Macof
Addressable Memory), where ports are assigned
corresponding to MAC addresses. When a segment arrives at 5.3 DDoS ATTACKS
a port, the CAM adds an entry to the table specifying the In this attack, a large number of remotely controlled systems
MAC of the machine that sent the segment along with the port attack a single target, causing denial of service for users of the
in which it is located. Thus, whenever a switch receives a targeted system. The flood of incoming messages to the target
segment directed to a machine it knows from what port it system forces it to shut down, thereby denying service to the
must send it. If the destination of the segment is unknown, system to licit users. Sometimes the traffic is enough to shut
because the associated entry to this machine has expired, the the site down completely. This type of attack is called
switch copies the segment and sends it to all ports of the same distributed denial-of-service (DDoS) attack. Referring to Fig
VLAN except to the port that received it. This way, all 7, it represents an example of distributed denial-of-service
machines connected to the switch receive this segment and (DDoS) attack as soon as Wireshark starts the capture process.
only the corresponding machine with a MAC that corresponds As depicted, an Apache is installed on machine 10.0.0.101. A
with the segment destination MAC replies. The switch then large number of TCP segments with the SYN flag activated
adds this entry in the CAM table with the new MAC/port from the same IP that do not receive a response (ACK) from
association [9]. With this done, the switch need not to flood the web service are generated. In Wireshark, the packet
all ports with future packets destined to this machine. sequence can be graphically seen by selecting from the menu
However, if hundreds of segments are sent falsifying the Statistics ->Flow Graph. This tool enables to track the
source MAC of the destination machine to fill up the CAM behavior of TCP connections as shown in Fig 7. It illustrates,
table, the behavior of the switch depends on the manufacturer. using arrows, the source and target of each packet,
Low-end switches do not contain sophisticated CAM tables; highlighting the active flags that interfere in the connection
as a result of which if a machine fills the table with the flow [4]. It can be easily noticed that there is a short period of
maximum number of entries (MAC/ port associations), all time when a number of connection attempts are made by the
VLANs are infected. IP 10.0.0.200 to port 80 of machine 10.0.0.101. This is a
rather suspicious scenario. The server has tried to resolve the
5.2.1 Proposed Solutions MAC of the client many times (for example in packet 7852),
Detecting this attack using a protocol analyzer is easy. Macof, but when no acknowledgement is received, it cannot send an
a member used in the Dsniff suit toolset, sends TCP segments ACK-SYN to the same machine to continue the three-step
without considering the protocol specifications (and hence it (handshake) connection. Thus the TCP/IP stack of the server
shows ‘Malformed Packet’ as in Fig-6). Macof is used to has to wait for a set time for each connection. During this idle
flood the switch on a LAN with MAC addresses. Since the time more packets keep arriving that trigger new connections.
switch regulates the flow of data between its ports, it actively For each new connection, a structure in memory called the
monitors (cache), the MAC address on each port and passes TCB (Transmission Control Block) is created and used by the
data only to the targeted machine. Wireshark can be helpful TCP/IP stack of the operating system to identify each
for the detection of these attacks. As already mentioned connection.
above, this attack takes place when packet flooding occurs at
all ports and the CAM table is full, it is also possible to let
Wireshark eavesdrop on any switch ports and monitor it for
malformed packets that are being received. High-end switches
can be configured with specific parameters to reduce this type
of attack. Some of the parameters that can be configured are:
he number of MAC by port (port security), the flooding level
of packets allowed by VLAN and MAC (Unicast Flooding
Protection), and the expiry time of the MAC in the CAM
table (ageing time).

Fig 7: Data Flow Capture


5.3.1 Proposed Solutions:
Besides the DDoS attacks mentioned above, there are various
other types of DDoS attacks like IP unreachable attack,

42
International Journal of Computer Applications (0975 – 8887)
Volume 94 – No 11, May 2014

ICMP transit attacks, Direct Attacks, TTL expiry attack, and can be found under the tab Statistics -> TCP Stream
Reflection Attacks etc. They are very difficult to analyze due Graph [12]. Under ideal conditions, the graph represents a
to the high volume of traffic involved. Many devices that line growing over time indicating efficient performance the
enable to stop these attacks are expensive. Contacting the ISP TCP connection [13]. However, in some scenarios there will
seems the most appropriate action to monitor such attacks. be gaps and bumps that intervene the continuity of the line.
However, when the magnitude of attack is not very excessive, This occurs due to a resend of data as result of lost ACK
an appropriate configuration of the operating system and duplications, segments retransmissions due to packet loss,
kernel services could help to counteract the attack. For expired timeouts etc. This graph can be extremely beneficial
example, there are various Linux kernel parameters that to detect irregularities in the behavior of TCP data flow.
enable to modify the traffic behavior which are very useful to Another graph that gives valuable information about network
protect the server from these attacks. traffic is the one on input/output. It can be found in Statistics -
> I/O Graph. Users can select various filters based on which
5.4 DHCP AND DNS SPOOF they want to filter the data. It gives the graphical
An interesting feature of the DHCP protocol is that it does not representation of various filters in different colors. A concise
have authentication mechanisms which enable to verify the data on the percentage of use of each protocol captured can be
source of the packets during the exchange of configuration obtained under Statistics -> Protocol Hierarchy, where the
parameters. In this kind of attack, the hacker can access hierarchy and precedence of each protocol, sent/received
a network traffic by falsifying responses that is sent by an packets and their size are shown.
authentic DHCP server. It allows a hacker to monitor and
sniff all the traffic. All the data packets in the LAN cross the
attacker’s interface which makes it vulnerable to packet
capturing. Giving a brief description how DHCP Spoofing
occurs, when a client sends a DHCP request on the network,
this request is broadcasted and all hosts on the LAN receive it.
Only the DHCP server is aware of the actual meaning of this
request. In the normal functioning, the real DHCP server
replies to the client with its IP address, Subnet mask and
Default Gateway. The attacker in the network simulates a
DHCP server on its host PC. With this, the attacker can reply
to DHCP request before the actual DHCP server. It configures
the client host with not only the IP address of that subnet but
in addition, it also gives the host a false Default Gateway
address and sometimes even a false DNS server address. In
this manner, the attacker redirects all the data packets of the
client host to himself [7]. The hacker later on forwards the Fig 8: Stevens (Time/ Sequence )Graph in Wireshark
frames from client host to real destinations in order to make
the client communication possible. The essence of this attack
is that the client never knows that his communication is
always going through the attacker PC and that the attacker is
actually sniffing all the frames.

5.4.1 Proposed Solutions:


Wireshark warns the user of any abnormal use of DHCP
protocol. Yet another symptom of this attack is the generation
of errors on the machines due to duplicated IPs. Tools such as
Yersinia (layer 2 hacking tool), Ettercap can be used for
analyzing and monitoring networks. Ettercap is the mnemonic
for Ethernet Capture. It supports excellent features like
analyzing a network using protocol dissection, sniffing of live
data connections etc. Other alternative is to configure a DHCP
server in the attacking machine, such as dhcpd3, to create
MitM (Man in the Middle) using false DHCP responses [8].
Tools like those mentioned above are an aid to detect DHCP
and DNS attacks on a local network.
6. GRAPHICAL USAGE OF Fig 9: Wire shark IO (Input Output Graph) after
WIRESHARK data capturing.
Wireshark like previously seen, is a versatile tool that offers a 7. FUTURE WORK
wide range of options to examine the performance of a Wireshark as described above proves to be extremely
network graphically based on a multiple parameters. advantageous for analyzing and monitoring a network and
Graphical representation of statistics enable to study the also to detect various threats that can slow down a network.
network in a lucid manner. Two graphs in Wireshark prove to However, Wireshark cannot foresee the future trends of
be extremely useful for traffic analysis. One of them is the packet streams in a network. It cannot warn the users well in
Stevens graph and the other one is I/O graph. advance that an attack is likely to take place. It will be a boon
A TCP session can be tracked graphically to study the to the IT industry and a massive prevention to the loss of
relationship between time and sequence number in a data resources, if it is known well in advance that a bug is likely to
stream. This graph is called a Time Sequence Graph (Steven)

43
International Journal of Computer Applications (0975 – 8887)
Volume 94 – No 11, May 2014

affect the network. Network analysts must look into methods 9. ACKNOWLEDGMENTS
so that Wireshark can predict the flow of data streams. Sincere thanks to the professors of the Department of
Electronics and Communication and the department of
8. CONCLUSION Information and Communication Technology for providing
Wireshark is one of the many packet sniffing software that are excellent laboratory facilities to carry out the experimental
available today. It was chosen as the tool to discuss detailed methodology using Wireshark listed under the paragraph
analysis of network traffic due to its advantages mentioned ‘EXPERIMENTAL METHODOLOGY’
under the paragraph ‘AN OVERVIEW OF WIRESHARK’.
Just to summarize, Wireshark is a useful tool that offers 10. REFERENCES
countless functions that help to analyze multiple network [1] Wireshark Documentation:
problems; those caused by poor network configuration or http://www.wireshark.org/docs/wsug_html_chunked/inde
device failures and also a variety of external and internal LAN x.html
attacks. The first step in resolving network problems consists [2] Stolze M, Pawlitzek R and Hild S (2009a) Task Support
of analyzing where the problem has occurred in a network and for Network Security Monitoring. In ACM CHI
what has led to performance loss. Network administrators Workshop on System Administrators Are Users, Too:
should be aware of the importance of using this type of tool, Designing Workspaces for Managing Internet-Scale
as it is a key utility to detect the source of network problems Systems.
that would otherwise take a great deal of resources and time to
[3] Madsen, P., Koga, Y., Takahashi, K.: Federated identity
discover.
management for protecting users from ID theft
Packet sniffers like Wireshark can be a boon for network Proceedings of the 2005 workshop on Digital identity
monitoring, but sometimes it is necessary to prevent packet management Fairfax, VA, USA (2010) 77-83
sniffers from collecting sensitive information like passwords, [4] Gouda, M.G., Liu, A.X., Leung, L.M., Alam, M.A.: Single
in order to maintain security in the IT industry. Two important Password, Multiple Accounts. Proceedings of 3rd
actions that can protect users from packet sniffers and other Applied Cryptography and Network Security Conference
eavesdropping attacks are as follows: First one is (industry track), New York City, New York (2008)
data encryption (hiding). Data encryption helps protect
[5] Riley, S.: Password Security: What Users Know and What
sensitive data and passwords while in transit, packet sniffers
They Actually Do. Usability News, Vol. 2006. Software
merely prove useless, if data is encrypted. Encryption can be
Usability Research Laboratory, Department of
implemented in a number of ways: SSL-Secure socket layer
Psychology, Wichita State University, Wichita (2009)
(HTTPS- where S stands for SSL) connections to Web
servers, encrypted SSL or TLS (Transport Layer Security) [6] 2010 18th IEEE Symposium on High Performance
connections to mail servers, or other application-specific Interconnects Innovating in Your Network with
techniques. Alternatively, a virtual private network (VPN) can OpenFlow: A Hands-on Tutorial
be used to encrypt entire communications links, regardless of [7] 2011 Fourth International Joint Conference on
protocol. Second one being use of a switched network. In this Computational Sciences and Optimization: Application
case, a packet sniffer will only be able to capture data stream Design of Data Packet Capturing Based on Sharpcap
packets arriving on its own local switch port. If each system is [8] The 6th International Conference on Computer Science &
assigned to an individual switch port, there simply won't be Education (ICCSE 2011) August 3-5, 2011. SuperStar
any packets for the packet sniffer to intercept. Virgo, Singapore: Application of Mini Case Study in
Network traffic analysis is of prime importance in any Computer Networks
organization. In such a highly IT driven generation, if the [9] Andrew S. Tanenbaum, “Computer Networks.” 4th ed.
network is slow/ down even for a few minutes, it can incur Beijing: Tsinghua University Press, 2004, pp.41.
huge losses to the company. Hence it is important to analyze [10] IEEE 2008 publication: Bottleneck Analysis of Traffic
networks and be aware of the network threats beforehand. Monitoring using Wireshark
Network analyzers like Wireshark are cost effective and a
very useful tool for in depth network analysis. This is a [11] I. Kim, J. Moon, H. Y. Yeom, "Timer-Based Interrupt
review paper that describes several ways of analyzing network Mitigation for High Performance Packet Processing," in
traffic with Wireshark, with the help of practical examples. Proc. 5th International Conference on High-Performance
The paper also discusses some common attacks that can Computing, (Asia-Pacific Region, 2011).
threaten local area networks and appropriate measures to [12] J. Cleary, S. Donnelly, I. Graham, "Design Principles for
mitigate the impact of these attacks on the network. This Accurate Passive Measurement in Networks," in Proc.
paper can be extremely beneficial to a novice who wishes to PAM2000 Passive and Active Measurement Workshop
have a detailed monitoring of his network. Starting with a (Apr. 2000).
brief description about Wireshark, then moving on to ways to [13] Traffic Analysis with Wireshark, February 2011, Author:
capture data under different circumstances and finally Borja Merino Febrer, The National Communications
discussing various attacks that can affect a network (with their Technology Institute (Instituto Nacional de Tecnologías
proposed solutions), this paper has it all. Lastly, the paper de la Comunicación - INTECO) Manuel Belda, from
describes how to use graphs in Wireshark to interpret the Valencia's Computer Security Incident Response Team
benefits and efficiency of the network. The paper also talks (CSIRT-cv) and Eduardo Carozo Blumsztein from the
about some of the security issues related to Wireshark and ANTEL CSIRT of Uruguay.
suggests solutions for the same. Wireshark, apart from being
[14] Di Guangqun, Hu Guijang. “Development and
one of the best protocol analyzers today, is an excellent source
implementation of packet sniffer”, CNKI: SUN:
of knowledge for any IT professional, network analyst or
WJSJ.0.2009-21- 082.pp.1-5, 2009
communications enthusiast.

IJCATM : www.ijcaonline.org
44

You might also like