CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Sniffing: A Major Threat to Secure Socket layer and its Detection

Published on Decmber 2011 by Ajay Mathur, Sudhir Kr.Sharma, Amit Mishra
International Conference on Computer Communication and Networks CSI-COMNET-2011
Foundation of Computer Science USA
COMNET - Number 1
Decmber 2011
Authors: Ajay Mathur, Sudhir Kr.Sharma, Amit Mishra
3d542d33-85de-47e2-b1c8-dab9d4120235

Ajay Mathur, Sudhir Kr.Sharma, Amit Mishra . Sniffing: A Major Threat to Secure Socket layer and its Detection. International Conference on Computer Communication and Networks CSI-COMNET-2011. COMNET, 1 (Decmber 2011), 135-139.

@article{
author = { Ajay Mathur, Sudhir Kr.Sharma, Amit Mishra },
title = { Sniffing: A Major Threat to Secure Socket layer and its Detection },
journal = { International Conference on Computer Communication and Networks CSI-COMNET-2011 },
issue_date = { Decmber 2011 },
volume = { COMNET },
number = { 1 },
month = { Decmber },
year = { 2011 },
issn = 0975-8887,
pages = { 135-139 },
numpages = 5,
url = { /proceedings/comnet/number1/5437-1025/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Computer Communication and Networks CSI-COMNET-2011
%A Ajay Mathur
%A Sudhir Kr.Sharma
%A Amit Mishra
%T Sniffing: A Major Threat to Secure Socket layer and its Detection
%J International Conference on Computer Communication and Networks CSI-COMNET-2011
%@ 0975-8887
%V COMNET
%N 1
%P 135-139
%D 2011
%I International Journal of Computer Applications
Abstract

Network sniffing was considered as a major threat to network and web application. Every device connected to the Ethernet-network receives all the data that is passed on the segment. By default the network card processes only data that is addressed to it. However listening programs turn network card in a mode of reception of all packets – called promiscuous mode. So, a sniffer is a special program or piece of code that put the Network Interface Card (NIC) in the promiscuous mode. When NIC works in promiscuous mode, the user of that system can steal all the data including password etc. without generating any traffic. Any network system running the sniffer can see all the data movement over the network. Many sniffers like wireshark, Cain & Abel, ethersniff etc. are available at no cost on the internet. There are many proposed solutions are available for the detection of network sniffing including antisniff [1], SnifferWall [2], Sniffer Detector [3] etc. but any solution does not guarantee full security. Due to this reason many new techniques were developed including secure socket layer (https), one time password etc. but now there are some techniques that can be used to sniff this secure data. In this paper we are discussing different aspects of sniffing, methods to sniff data over secure socket network and detection of sniffer. The paper describes all the technical details and methods to perform this task. The Address Resolution Protocol packets are used to query hardware addresses from IP addresses. We are using this fact to verify to whether the NIC’s are set to promiscuous mode. When NIC receiving all packets, it will not block any packet and forwards it to the kernel for further processing. Now according to the working of the ARP, the kernel may make mistake by responding to some packets that it is not supposed to respond. So according to this mechanism we can compose fake ARP request packets and send them to every node on the network. If any node responds to this fake request, we can detect it is running in promiscuous mode.

References
  1. http://www.securitysoftwaretech.com/antisniffing, (2004).
  2. H. M. Kortebi AbdelallahElhadj, H. M. Khelalfa, An experimental sniffer detector: Snifferwall, (2002).
  3. Thawatchai Chomsiri, Sniffng packets on lan without arp spooffing, Third 2008 International Conference on Convergence and Hybrid Information Technology(2008).
  4. D. Wu and F. Wong, Remote sni_er detection, Computer Science Division, University of California, Berkeley (1998).
  5. Daiji Sanai, Detection of promiscuous node using arp packets, www.securityfriday.com (2001). 50-51
  6. Detection and Prevention of Active Sniffing on Routing Protocol, Pathmenanthan ramakrishna' and mohd aizaini maarof, Student Conference on Research and Development Proceedings, Shah Alam, Malaysia (2002).
  7. www.evsslcertificate.com/ssl/description-ssl.html
  8. http://www.tcpdump.org.
  9. http://reptile.rug.ac.be/˜coder/sniffit/sniffit.html
  10. www.scribd.com/doc/29844162/Ettercap-Tutorial
  11. S. Grundschober, Sni_er detector report, IBM Research Division, Zurich Research Laboratory, Global Security Analysis Lab (1998).
  12. B. Issac S. Kamal, Analysis of network communication attacks, The 5th Student Conference on Research and Development (2007).
Index Terms

Computer Science
Information Sciences

Keywords

Keywords are your own designated keywords which can be used for easy location of the manuscript using any search engines