DocumentCode :
2563194
Title :
Malicious sniffing systems detection platform
Author :
Trabelsi, Zouheir ; Rahmani, Hamza ; Kaouech, Kamel ; Frikha, Mounir
Author_Institution :
Coll. of Telecommun., Tunisia Univ., Ariana, Tunisia
fYear :
2004
fDate :
2004
Firstpage :
201
Lastpage :
207
Abstract :
Among various types of attacks on an Ethernet network, a "sniffing attack" is probably one of the most difficult attacks to handle. Sniffers are programs that allow a host to capture any packets in an Ethernet network, by putting the host\´s network interface card (NIC) into the promiscuous mode. When a host\´s NIC is in the normal mode, it captures only the packets sent to the host. Since many basic services, such as FTP and SMTP, send passwords and data in clear text in the packets, Sniffers can be used by hackers to capture passwords and confidential data. This paper presents the design and implementation of two different techniques which can be used to detect any host running a sniffer on an Ethernet network. The first technique, ARP (address resolution protocol) detection, attempts first to send trap ARP request packets with fake hardware addresses, to a suspicious host. Then, based on the generated responses (ARP reply packets) and the operating system (OS) of the suspicious host, a decision is made on whether or not the suspicious host is running a sniffer. The second technique, RTT detection, uses the measurement of the RTT (round-trip time) of ICMP packets sent to suspicious hosts. Then, using a statistical model (the z-statistics) a probabilistic decision is made. The two techniques are implemented in two tools that automatically give system administrator a helping hand regarding the detection of sniffers on an Ethernet network. Related and future works are discussed.
Keywords :
data privacy; local area networks; network interfaces; probability; protocols; security of data; telecommunication security; ARP detection; ARP reply packets; Address Resolution Protocol; Ethernet; address resolution protocol; confidential data capturing; malicious sniffing system detection platform; network interface card; operating system; password capturing; probabilistic decision; round-trip time detection; sniffers; sniffing attack; statistical model; z-statistics; Communications technology; Computer displays; Computer hacking; Educational institutions; Ethernet networks; Filters; Hardware; Network interfaces; Operating systems; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Applications and the Internet, 2004. Proceedings. 2004 International Symposium on
Print_ISBN :
0-7695-2068-5
Type :
conf
DOI :
10.1109/SAINT.2004.1266117
Filename :
1266117
Link To Document :
بازگشت