..............................
..............................
..............................
An Intelligent Approach of Sniffer Detection Abdul Nasir Khan, Kalim Qureshi, and Sumair Khan
ARP cache poisoning and putting host Network Inter face Card (NIC) in promiscuous mode are ways of sni ffer
attacks. ARP cache poisoning attack is effective in an environment which is not broadcast in nature (l ike switch LAN
environment) and other attack is effective in an en vironment which is broadcast in nature (like hub, b us, access point LAN
environments). Sniffing is malicious activity perfo rmed by network user and because of this network se curity is at risk so
detection of sniffer is essential task to maintain network security. Sniffer detection techniques can be divided into two main
categories. First category’s techniques are used to detect a sniffer host that runs it’s NIC into promiscuous mode and second
category’s techniques are used to detect a sniffer host that uses ARP cache poisoning for sniffing. Th e network configuration is
hidden form users. Network users do not have any in formation about nature of network. Therefore, users of network may
invoke such sniffer detection technique that is not effective in that environment. This may result in sharing of his private and
confidential information with malicious users. In t his paper, we designed an intelligent invocation mo dule that checks the
nature of environment automatically and invokes app ropriate, sniffer detection technique for that environment. With the help
of this invocation module it is possible to detect passive as well as active sniffer hosts in both env ironments.
[1] AbdelallahElhadj H., Khelalfa H., and Kortebi H., An Experimental Sniffer Detector: SnifferWall, Technical Document , Securie des Communications sur Internet, 2002.
[2] Baxley T., Xu J., Yu H., Zhang H., Yuan X. , and Brickhouse J., LAN Attacker: A Visual Education Tool, in Proceedings of Conference Information Security Curriculum Development , USA, pp. 118-123, 2006.
[3] Chimphlee W., Abdullah A., Sap M., Chimphlee S., and Srinoy S., A Rough-Fuzzy Hybrid Algorithm for Computer Intrusion Detection, International Arab Journal of Information Technology , vol. 4, no. 1, pp. 247-254, 2007.
[4] Clincy V. and Krithi A., Evaluation and Illustration of a Free Software Tool for Wireless Network Monitoring and Security, The Journal of Computing Sciences in Colleges , vol. 21, no. 3, pp. 19-29, 2006.
[5] Fuentes F. and Kar D., Ethereal vs. Tcpdump: A Comparitive Study on Packet Sniffing Tools for Educational Purpose, Computer Journal of Computing Sciences in Colleges , vol. 20, no. 4, pp. 169-176, 2005.
[6] Gibson Research Corporation, ARP Cache Poisoning in Switch LAN Environment, available at: http://www.grc.com/ nat/arp.htm, last visited 2008.
[7] Hornig C., A Standard for the Transmission of IP Datagrams over Ethernet Networks, Symbolics Cambridge Research Center , 1984.
[8] Held G., Focus on Sniffer Portable, International Computer Journal of Network Management , vol. 13, no. 5, pp. 389-396, 2003.
[9] Khan A., Qureshi K., and Khan S., Enhanced Switched Network Sniffer Detection Technique Based on IP Packet Routing, Computer Journal of System Security , vol. 18, no. 4, pp. 153-162, 2009.
[10] Plummer D., An Ethernet Address Resolution Protocol-Converting Network Protocol to 48 bit An Intelligent Approach of Sniffer Detection 15 Ethernet Address for Transmission on Ethernet Hardware, RFC Editor , US, 1982.
[11] Russinovich M., PsExec Tool, 2007, available at: http://technet.microsoft.com/en- us/sysinternals /bb896649.aspx, last visited 2008.
[12] Trabelsi Z., Switched Network Sniffers Detection Technique Based on IP Packet Routing, Computer Journal of System Security Journal , vol. 14, no. 4, pp. 51-60, 2005.
[13] Trabelsi Z. and Shuaib K., Man in the Middle Intrusion Detection, in Proceedingss of IEEE Transition GLOBE COM , San Francisco, pp. 1-6, 2006.
[14] Trabelsi Z., Rahmani H., Kaouech K., and Frikha M., Malicious Sniffing Systems Detection Platform, in Proceedingss of IEEE/IPSJ International Symposium on Applications and the Internet , Tunisia, pp. 201-207, 2004.
[15] Trabelsi Z. and Rahmani H., Detection of Sniffers in an Ethernet Network, in Proceedingss of 7 th Information Security Conference , Berlin, pp. 170-182, 2004.
[16] Trabelsi Z. and Rahmani H., An Anti-Sniffer Based on ARP Cache Poisoning Attack, Information System Security Journal , vol. 13, no. 6, pp. 23-36, 2005.
[17] Yeo J., Youssef M., and Agrawala A., A Framework for Wireless LAN Monitoring and Its Applications, in Proceedingss of 3 rd ACM Workshop on Wireless Security , USA, pp. 70-79, 2004.
[18] Yuan X., Vega P., Xu J., Yu H., and Li Y., Using Packet Sniffer in Class Experience and Evaluation, in Proceedingss of the 45 th Annual Southeast Regional Conference ACMSE , USA, pp. 116-121, 2007. Abdul Nasir Khan received the MCS and MS (CS) degrees from the COMSATS Institute of Information Technology, Abbottabad, in 2005 and 2008, respectively. Currently, he is a lecturer in the Department of Computer Science, COMSATS Institute of Information Technology. His research interests are in various aspects of network securit y and their applications. Kalim Qureshi is a professor in Computer Science Department, COMSATS Institute of Information Technology, Abbattabad, Pakistan. He is an approved supervisor for the M.S. and Ph.D. thesis by the High Education Commission, Islamabad, Pakistan. His research interests include network parallel distributed computing, thread programming, concurrent algorithms designing, task scheduling, a nd performance measurement. He is a member of IEE Japan and IEEE Computer Society. Sumair Khan received the MCS and MS (CS) degrees from the OMSATS Institute of Information Technology, Abbottabad, in 2004 and 2007, respectively. Currently, he is a lecturer in the Department of Computer Science, COMSATS Institute of Information Technology. His research interests are in various aspects of network securit y and their applications.