Network Traffic Analysis and Intrusion Detection Using Packet Sniffer

  • Authors:
  • Mohammed Abdul Qadeer;Arshad Iqbal;Mohammad Zahid;Misbahur Rahman Siddiqui

  • Affiliations:
  • -;-;-;-

  • Venue:
  • ICCSN '10 Proceedings of the 2010 Second International Conference on Communication Software and Networks
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Computer software that can intercept and log traffic passing over a digital network or part of a network is better known as packet sniffer. The sniffer captures these packets by setting the NIC card in the promiscuous mode and eventually decodes them. The decoded information can be used in any way depending upon the intention of the person concerned who decodes the data (i.e. malicious or beneficial purpose). Depending on the network structure one can sniff all or just parts of the traffic from a single machine within the network. However, there are some methods to avoid traffic narrowing by switches to gain access to traffic from other systems on the network. This paper focuses on the basics of packet sniffer and its working, development of the tool on Linux platform and its use for Intrusion Detection. It also discusses ways to detect the presence of such software on the network and to handle them in an efficient way. Focus has also been laid to analyze the bottleneck scenario arising in the network, using this self developed packet sniffer. Before the development of this indigenous software, minute observation has been made on the working behavior of already existing sniffer software such as wireshark (formerly known as ethereal), tcpdump, and snort, which serve as the base for the development of our sniffer software. For the capture of the packets, a library known as libpcap has been used. The development of such software gives a chance to the developer to incorporate the additional features that are not in the existing one.