This document summarizes a research paper that examines packet sniffing. It discusses how packet sniffers work in both switched and non-switched networks. In non-switched networks, all nodes are connected to a hub, allowing packet sniffers to capture all traffic by putting the network card in promiscuous mode. In switched networks, packet sniffers can operate through techniques like ARP cache poisoning, CAM table flooding, and switch port stealing. The document also outlines positive applications of packet sniffing like network traffic analysis and intrusion detection.
Network Address Translation (NAT) allows private IP addresses to be used within a local area network (LAN) while providing access to the public internet. NAT maps private IP addresses to public IP addresses, allowing multiple devices to share public IP addresses. The main NAT traversal challenges are that NAT prevents outside systems from initiating connections to inside systems and communication between systems that are both behind NAT routers. Proposed solutions include using third-party servers to reverse connections or techniques like UDP and TCP hole punching that establish connections directly between systems.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
Discovering adaptive wireless sensor network using eSAT Journals
Abstract When we consider the standard Bellman-Ford algorithm, it uses static values of link cost function and distance function. These static values are stored in sink node so that the sink node requires memory to keep data safe. Therefore the space, message and time complexity of a network and node increases. To overcome this we discover Fast Time Dependent Shortest Path algorithm with message and used in network with β synchronizer. The FTSP algorithm uses dynamic values of link cost function and distance function and to store these values we are using vector compression method so that there is no need to store the data into the sink node. Because of this the message, time and space complexity of node will be decreases. Keywords- Duty cycle, Time dependent, β synchronizer
Discovering adaptive wireless sensor network using β synchronizereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
Dynamic nature of Mobile Ad-hoc networks (MANET) challenges the quality of service (QoS)
because route failure probability is increased in MANET due to the mobility of nodes. Lack of fixed
infrastructure, wireless shared medium and dynamic topology makes MANET prone to different types of
attacks. Ad-hoc On-Demand Distance Vector (AODV) routing protocol in MANETs which is vulnerable to a
variety of security threats in ad-hoc networks. Black hole attack is an attack that drop considerable number of
packet by performing packet forwarding misbehaviour and violate the security to cause Denial-of-Service
(DoS) in Mobile Ad-hoc networks (MANET). In this paper we investigate different mechanism to detect and
prevent black hole attack in AODV protocol. We also discuss about advantages and disadvantages of the
methods.
Impact of black hole attack on aodv routing protocolZac Darcy
A
m
obile
a
d
-
hoc
n
etwork (MANET)
is a
collection
of wireless mobile nodes
that dynamically self
-
organize
to form an
arbitrary and temporary network.
The mobile nodes can communicate wit
h each other
without
any fixed infrastructure.
MANET
can be set
up quickly to facilitate communication in a hostile environment
such as battlefield or emergency situation.
The various severe security threats are
increasing
on the
MANET
. One of these secur
ity threats is black hole attack which drops all received data packets intended
for forwarding. In this paper, we are simulating and analyzing the impact of black hole attack on Ad Hoc
On
-
Demand Distance Vector (AODV) protocol. Th
e simulation is carried on
NS
-
2 and t
he simulation
results are analyzed
on
various network performance
metric
s such as packet delivery ratio, normalized
routing overhead
and
average end
-
to
-
end delay
A network behavior analysis method to detect this writes about a method to ...Thang Nguyen
This document proposes a network behavior analysis method to detect reverse remote access trojans (RATs) using machine learning. It extracts 4 network behavior features from TCP sessions: out-in-bytes ratio, PSH flag ratio, early stage packet number, and heartbeat flag. Six machine learning classifiers are tested on a dataset of real RAT and normal traffic. Random forest achieves the best performance with an accuracy of 0.957 and AUC of 0.979, indicating the method can effectively detect encrypted reverse RAT connections by analyzing network behavior features.
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Performance analysis of aodv protocol on blackhole attackMehedi
This document discusses the AODV routing protocol, black hole attacks against AODV, and analyzing AODV's performance under black hole attacks. It introduces AODV, explains why it is used, and outlines security issues. It then defines distributed denial of service (DDoS) and black hole attacks, describing how black holes work at the routing level to drop packets. The document concludes it will use a network simulator to analyze how black hole attacks affect AODV performance metrics.
Study and analysis vurnerability of aodv protocolMehedi
This document discusses security issues in the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It describes various attacks against AODV like wormhole attacks, colluding misrelay attacks, replay attacks, and false route error messages. It also explains black hole attacks and distributed denial of service (DDoS) attacks. The document analyzes why AODV is vulnerable to such attacks due to its characteristics. It concludes that attacks like black hole attacks highly impact AODV's performance and proposes future work to simulate black hole attacks on AODV using a network simulator.
Review on Grey- Hole Attack Detection and PreventionIJARIIT
These Grey Hole attacks poses a serious security threat to the routing services by attacking the reactive routing protocols resulting in drastic drop of data packets. AODV (Ad hoc on demand Distance Vector) routing being one of the many protocols often becomes an easy victim to such attacks. The survey also gives up-to-date information of all the works that have been done in this area. Besides the security issues they also described the layered architecture of MANET, their applications and a brief summary of the proposed works that have been done in this area to secure the network from Grey Hole attacks
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
In this paper we propose a system that allows a safe and secure data transfer in MANETs between the source and the destination. As MANETs are unplanned networks and networks of instant communication, they are prone to attacks like disclosure, brute force attacks etc. In this paper we mainly concentrate on limiting the disclosure attacks in MANETs. Disclosure attack means that the network is monitored quietly without modifying it. The monitoring of network is possible only if the traffic is known. Hiding of traffic between the source and destination would prevent disclosure attacks in MANETs. To hide the traffic between the source and destination we must identify it. The traffic is identified using STARS(Statistical Traffic Pattern Discovery System for MANETs) technique. Using this technique, the traffic is made observable only for the intermediary nodes and the data is sent via intermediary nodes to the destination as single hop. The data which is sent as single hop by hop via intermediary nodes prevents the malicious node from knowing the original source and destination and thus preventing MANETs from disclosure attack.
Comparison of the performance of trsaodv with aodv under blackhole attack in ...eSAT Journals
Abstract
A MANET is a self configuring, decentralized network of mobile nodes with limited energy and bandwidth. They have dynamic
topology which means their topology keeps changing. These bring lot of challenges in routing. Since there is no central authority
the mobile nodes act both as hosts as well as routers. They provide great comfort due to their portability and ease of installation
with no infrastructure but their nature brings in security issues which could not be compromised which paves way for extensive
research. They are vulnerable to many attacks and one such attack, Black hole Attack is implanted and a Trust based AODV,
TRSAODV has been proposed to overcome the attack and a comparative analysis of proposed TRSAODV with AODV is done in
this paper.
KeyWords: MANET; Blackhole Attack; AODV; Trust; TRSAODV;
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These cause extra challenges on security. In this paper, evaluation of prominent on-demand routing protocol i.e. AODV,MAODV,RAODV has been done by varying the network size. An effort has been carried out to do the performance evaluation of these protocols using random way point model. The simulator used is NS 2.34. The performance of either protocol has been studied by using a self created network scenario with respect to pause time.
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
Abstract The key theory of our redundancy management is to achieve the tradeoff between energy consumption vs. the gain in timeliness, security, and reliability to increase the system useful lifetime. A Innovative probability model to analyze the best redundancy level in terms of source redundancy, path redundancy and as well as the best intrusion detection settings in terms of the number of voters and the intrusion invocation break under which the lifetime of a HWSN [Heterogeneous Wireless Sensor Network] is maximized. In redundancy management “badmouthing” is the major problem in managing the redundancy. This badmouthing is malicious node which will never drop the packet even after knowing that the packet has been sent already. In this paper we propose a new scheme to overcome the problem of badmouthing by weighted based voting, this protocol will weight (Success Rate) all the nodes in the network to find the non-malicious node in the network which having more packet drop. In “weighted voting” main function is to find trust/reputation of neighbor nodes, as well as to tackle the “what paths to use” problem in multipath routing decision making for intrusion tolerance in WSNs. Keywords: Bad mouthing, Wireless Sensor Network, Weighted Based Voting, HWSN.
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
This document summarizes a research paper that proposes a new scheme called weighted-based voting to overcome the problem of "badmouthing" attacks in wireless sensor networks with multipath routing. Badmouthing occurs when malicious nodes fail to drop packets even after knowing the packet was already delivered. The weighted-based voting protocol assigns weights based on success rates to identify trusted nodes. It uses weighted voting to make multipath routing decisions and remove malicious nodes detected by a distributed intrusion detection system based on votes from random voter nodes. The goal is to maximize network lifetime while satisfying quality of service requirements in heterogeneous wireless sensor networks.
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...IRJET Journal
This document proposes a secure method for the Ad Hoc On-Demand Distance Vector (AODV) routing protocol to detect wormhole attacks in mobile ad hoc networks. The proposed method uses nested authentication technique (NMAC) and key pre-distribution to authenticate routing messages and secure packet transmissions. NMAC requires two keys selected based on the hop count value in control packets. At each node, the message digest is recalculated using the new hop count value and compared to the received digest to authenticate the message. The key pre-distribution technique aims to minimize overhead by sharing keys dependent on hop counts. The method aims to efficiently detect and prevent wormhole attacks on AODV routing in MANETs with low processing overhead.
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
Sensor network facilitates monitoring and controlling of physical environments. These wireless networks consist of dense collection of sensors capable of collection and dissemination of data. They have application in variety of fields such as military purposes, environment monitoring etc. Typical deployment of sensor network assumes central processing station or a gateway to which all other nodes route their data using dynamic source routing (DSR). This causes congestion at central station and thus reduces the efficiency of the network. In this work we will propose a better dynamic source routing technique using network coding to reduce total number of transmission in sensor networks resulting in better efficiency.
This document provides an overview of the AODV routing protocol for ad hoc networks and security issues associated with it. It first introduces ad hoc networks and discusses the basic differences between infrastructure and ad hoc networks. It then summarizes several popular routing protocols for ad hoc networks, including DSDV, DSR, TORA, and AODV. The document focuses on explaining the route discovery and maintenance processes of AODV. It also discusses common security attacks against AODV like black hole attacks and wormhole attacks. Finally, it mentions some approaches to secure AODV like using digital signatures, authentication, and intrusion detection systems.
This document discusses the black hole attack on the AODV routing protocol in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses how AODV works and the types of control packets it uses. It then explains how the black hole attack exploits AODV by having a malicious node send fake route reply messages, allowing it to drop packets. Several techniques for detecting and mitigating black hole attacks on AODV are discussed. The document reviews related work on defending against such attacks using approaches like security-aware ad hoc routing protocols.
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
This document summarizes a research paper that simulates the Ad Hoc On-Demand Distance Vector (AODV) routing protocol under black hole attacks in mobile ad hoc networks (MANETs). The paper analyzes how black hole attacks affect key AODV routing metrics like packet delivery ratio and end-to-end delay. Through simulations with varying numbers of nodes, the paper finds that black hole attacks significantly reduce packet delivery ratios by diverting traffic to malicious nodes. The simulations provide insight into how AODV performance degrades under such attacks.
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. A distributed denial-of-service attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. The proposed system suggests a mechanism based on entropy variations between normal and DDoS attack traffic. Entropy is an information theoretic concept, which is a measure of randomness. The proposed method employs entropy variation to measure changes of randomness of flows. The implementation of the proposed method brings no modifications on current routing software.
The document summarizes a seminar report on packet sniffing submitted by four students. It discusses different packet sniffing methods like IP-based, MAC-based, and ARP-based sniffing. It also explains how Anti-Sniff tries to detect these sniffing programs using MAC address detection and DNS detection methods. The report analyzes how packet sniffers work on both shared and switched Ethernet networks and their various uses for both network troubleshooting and unauthorized access purposes. Common sniffing tools like tcpdump, sniffit, and ethereal are also mentioned.
This document provides an overview of using Wireshark to capture and analyze network packets. It discusses how Wireshark works by grabbing all packets sent to and from a machine's network interface card. It then demonstrates how to start a packet capture in Wireshark, set filters, and view captured packets in real-time. The document also explains the different panes in Wireshark for viewing packet lists, details, and bytes.
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Performance analysis of aodv protocol on blackhole attackMehedi
This document discusses the AODV routing protocol, black hole attacks against AODV, and analyzing AODV's performance under black hole attacks. It introduces AODV, explains why it is used, and outlines security issues. It then defines distributed denial of service (DDoS) and black hole attacks, describing how black holes work at the routing level to drop packets. The document concludes it will use a network simulator to analyze how black hole attacks affect AODV performance metrics.
Study and analysis vurnerability of aodv protocolMehedi
This document discusses security issues in the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It describes various attacks against AODV like wormhole attacks, colluding misrelay attacks, replay attacks, and false route error messages. It also explains black hole attacks and distributed denial of service (DDoS) attacks. The document analyzes why AODV is vulnerable to such attacks due to its characteristics. It concludes that attacks like black hole attacks highly impact AODV's performance and proposes future work to simulate black hole attacks on AODV using a network simulator.
Review on Grey- Hole Attack Detection and PreventionIJARIIT
These Grey Hole attacks poses a serious security threat to the routing services by attacking the reactive routing protocols resulting in drastic drop of data packets. AODV (Ad hoc on demand Distance Vector) routing being one of the many protocols often becomes an easy victim to such attacks. The survey also gives up-to-date information of all the works that have been done in this area. Besides the security issues they also described the layered architecture of MANET, their applications and a brief summary of the proposed works that have been done in this area to secure the network from Grey Hole attacks
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
In this paper we propose a system that allows a safe and secure data transfer in MANETs between the source and the destination. As MANETs are unplanned networks and networks of instant communication, they are prone to attacks like disclosure, brute force attacks etc. In this paper we mainly concentrate on limiting the disclosure attacks in MANETs. Disclosure attack means that the network is monitored quietly without modifying it. The monitoring of network is possible only if the traffic is known. Hiding of traffic between the source and destination would prevent disclosure attacks in MANETs. To hide the traffic between the source and destination we must identify it. The traffic is identified using STARS(Statistical Traffic Pattern Discovery System for MANETs) technique. Using this technique, the traffic is made observable only for the intermediary nodes and the data is sent via intermediary nodes to the destination as single hop. The data which is sent as single hop by hop via intermediary nodes prevents the malicious node from knowing the original source and destination and thus preventing MANETs from disclosure attack.
Comparison of the performance of trsaodv with aodv under blackhole attack in ...eSAT Journals
Abstract
A MANET is a self configuring, decentralized network of mobile nodes with limited energy and bandwidth. They have dynamic
topology which means their topology keeps changing. These bring lot of challenges in routing. Since there is no central authority
the mobile nodes act both as hosts as well as routers. They provide great comfort due to their portability and ease of installation
with no infrastructure but their nature brings in security issues which could not be compromised which paves way for extensive
research. They are vulnerable to many attacks and one such attack, Black hole Attack is implanted and a Trust based AODV,
TRSAODV has been proposed to overcome the attack and a comparative analysis of proposed TRSAODV with AODV is done in
this paper.
KeyWords: MANET; Blackhole Attack; AODV; Trust; TRSAODV;
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These cause extra challenges on security. In this paper, evaluation of prominent on-demand routing protocol i.e. AODV,MAODV,RAODV has been done by varying the network size. An effort has been carried out to do the performance evaluation of these protocols using random way point model. The simulator used is NS 2.34. The performance of either protocol has been studied by using a self created network scenario with respect to pause time.
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
Abstract The key theory of our redundancy management is to achieve the tradeoff between energy consumption vs. the gain in timeliness, security, and reliability to increase the system useful lifetime. A Innovative probability model to analyze the best redundancy level in terms of source redundancy, path redundancy and as well as the best intrusion detection settings in terms of the number of voters and the intrusion invocation break under which the lifetime of a HWSN [Heterogeneous Wireless Sensor Network] is maximized. In redundancy management “badmouthing” is the major problem in managing the redundancy. This badmouthing is malicious node which will never drop the packet even after knowing that the packet has been sent already. In this paper we propose a new scheme to overcome the problem of badmouthing by weighted based voting, this protocol will weight (Success Rate) all the nodes in the network to find the non-malicious node in the network which having more packet drop. In “weighted voting” main function is to find trust/reputation of neighbor nodes, as well as to tackle the “what paths to use” problem in multipath routing decision making for intrusion tolerance in WSNs. Keywords: Bad mouthing, Wireless Sensor Network, Weighted Based Voting, HWSN.
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
This document summarizes a research paper that proposes a new scheme called weighted-based voting to overcome the problem of "badmouthing" attacks in wireless sensor networks with multipath routing. Badmouthing occurs when malicious nodes fail to drop packets even after knowing the packet was already delivered. The weighted-based voting protocol assigns weights based on success rates to identify trusted nodes. It uses weighted voting to make multipath routing decisions and remove malicious nodes detected by a distributed intrusion detection system based on votes from random voter nodes. The goal is to maximize network lifetime while satisfying quality of service requirements in heterogeneous wireless sensor networks.
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...IRJET Journal
This document proposes a secure method for the Ad Hoc On-Demand Distance Vector (AODV) routing protocol to detect wormhole attacks in mobile ad hoc networks. The proposed method uses nested authentication technique (NMAC) and key pre-distribution to authenticate routing messages and secure packet transmissions. NMAC requires two keys selected based on the hop count value in control packets. At each node, the message digest is recalculated using the new hop count value and compared to the received digest to authenticate the message. The key pre-distribution technique aims to minimize overhead by sharing keys dependent on hop counts. The method aims to efficiently detect and prevent wormhole attacks on AODV routing in MANETs with low processing overhead.
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
Sensor network facilitates monitoring and controlling of physical environments. These wireless networks consist of dense collection of sensors capable of collection and dissemination of data. They have application in variety of fields such as military purposes, environment monitoring etc. Typical deployment of sensor network assumes central processing station or a gateway to which all other nodes route their data using dynamic source routing (DSR). This causes congestion at central station and thus reduces the efficiency of the network. In this work we will propose a better dynamic source routing technique using network coding to reduce total number of transmission in sensor networks resulting in better efficiency.
This document provides an overview of the AODV routing protocol for ad hoc networks and security issues associated with it. It first introduces ad hoc networks and discusses the basic differences between infrastructure and ad hoc networks. It then summarizes several popular routing protocols for ad hoc networks, including DSDV, DSR, TORA, and AODV. The document focuses on explaining the route discovery and maintenance processes of AODV. It also discusses common security attacks against AODV like black hole attacks and wormhole attacks. Finally, it mentions some approaches to secure AODV like using digital signatures, authentication, and intrusion detection systems.
This document discusses the black hole attack on the AODV routing protocol in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses how AODV works and the types of control packets it uses. It then explains how the black hole attack exploits AODV by having a malicious node send fake route reply messages, allowing it to drop packets. Several techniques for detecting and mitigating black hole attacks on AODV are discussed. The document reviews related work on defending against such attacks using approaches like security-aware ad hoc routing protocols.
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
This document summarizes a research paper that simulates the Ad Hoc On-Demand Distance Vector (AODV) routing protocol under black hole attacks in mobile ad hoc networks (MANETs). The paper analyzes how black hole attacks affect key AODV routing metrics like packet delivery ratio and end-to-end delay. Through simulations with varying numbers of nodes, the paper finds that black hole attacks significantly reduce packet delivery ratios by diverting traffic to malicious nodes. The simulations provide insight into how AODV performance degrades under such attacks.
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. A distributed denial-of-service attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. The proposed system suggests a mechanism based on entropy variations between normal and DDoS attack traffic. Entropy is an information theoretic concept, which is a measure of randomness. The proposed method employs entropy variation to measure changes of randomness of flows. The implementation of the proposed method brings no modifications on current routing software.
The document summarizes a seminar report on packet sniffing submitted by four students. It discusses different packet sniffing methods like IP-based, MAC-based, and ARP-based sniffing. It also explains how Anti-Sniff tries to detect these sniffing programs using MAC address detection and DNS detection methods. The report analyzes how packet sniffers work on both shared and switched Ethernet networks and their various uses for both network troubleshooting and unauthorized access purposes. Common sniffing tools like tcpdump, sniffit, and ethereal are also mentioned.
This document provides an overview of using Wireshark to capture and analyze network packets. It discusses how Wireshark works by grabbing all packets sent to and from a machine's network interface card. It then demonstrates how to start a packet capture in Wireshark, set filters, and view captured packets in real-time. The document also explains the different panes in Wireshark for viewing packet lists, details, and bytes.
Uk computer emergency response team (cert) introduction to social engineeringPublicLeaker
This document provides an introduction to social engineering techniques. It describes common social engineering attacks like phishing emails, baiting websites, spear phishing targeted attacks, watering hole attacks, and physical baiting. Phishing remains the most prolific attack, while more sophisticated methods focus targets and use multiple layers. Effective defenses include educating users about social engineering techniques and promoting an organizational culture of information security awareness. However, a skilled attacker can still successfully retrieve information through social engineering given enough resources and luck. Organizations should have response and recovery plans for successful attacks.
This document discusses security threats employees may face outside of the office. It notes that hackers can target employees through tailgating, shoulder surfing, and theft. Tailgating occurs when an unauthorized person enters a secure area by following someone with access. Shoulder surfing means others look over your shoulder to see private information. The document emphasizes that employees need to be aware of their surroundings both when traveling and in the office, and provides tips for safe practices in both locations such as using a VPN and strong passwords.
The document discusses various methods of social engineering such as phishing, baiting, and ransomware that aim to manipulate people into divulging private information. It provides examples of common social engineering scams like phishing emails and explains how to identify potential scams and protect personal information. The document also offers advice on what to do if a social engineering attempt was successful, such as immediately contacting IT security and changing passwords.
Este documento resume las principales ventajas del estudio de la biodiversidad en Colombia. Entre las ventajas se encuentran que Colombia es uno de los países más ricos en biodiversidad del planeta, la biodiversidad proporciona alimentos, combustibles, fibras y participa en ciclos biogeoquímicos importantes. Además, la biodiversidad genera empleos en áreas ambientales, provee servicios como regulación del clima, control de enfermedades, recreación y medicinas. El turismo de áreas naturales también representa una fuente de ingresos.
Link baiting involves creating content that encourages others to share links to your website organically. This can boost search engine rankings and traffic in the short term. Effective link bait uses "hooks" like timely news, contrary opinions, humor, or valuable resources to generate interest and discussion. Some risks include link bait backfiring or creating a negative impression if not handled carefully.
The document discusses phishing awareness and defines various types of phishing scams such as regular phishing, spear phishing, whaling, vishing, smishing, and sextortion. It provides examples of each type of scam and advises on how to identify phishing attempts and protect yourself, including by being wary of unknown senders, sensational subject lines, and not following unsolicited links or downloading attachments. The document is from the Naval OPSEC Support Team at the Navy Information Operations Command in Norfolk.
This document compares and contrasts IPv4 and IPv6. It begins by defining Internet Protocol (IP) and its purpose of identifying hosts and enabling location addressing. It then describes IPv4, including its 32-bit address structure, address notation, and class-based allocation that resulted in address exhaustion issues. The document also covers IPv6's 128-bit addresses that provide vastly more capacity to address this problem. Key differences between IPv4 and IPv6 are outlined, such as IPv6's elimination of NAT. The concepts of subnetting, supernetting, and private address ranges are also introduced to optimize IPv4 network design.
This document provides an overview of network sniffing including definitions, vulnerable protocols, types of sniffing attacks, tools used for sniffing, and countermeasures. It discusses passive and active sniffing, ARP spoofing, MAC flooding, DNS poisoning techniques, and popular sniffing tools like Wireshark, Arpspoof, and Dsniff. It also outlines methods for detecting sniffing activity on a network such as monitoring for changed MAC addresses and unusual packets, as well as recommendations for implementing countermeasures like encryption, static ARP tables, port security, and intrusion detection systems.
The document describes a sniffer device that can detect and locate lost mobile phones. The sniffer acts as a small base station that operates at a different frequency than mobile networks. It includes a unidirectional antenna and tracking software. The sniffer detects lost phones by their unique IMEI number stored in a database. When in range, it can communicate with lost phones and track their location to help recover them. The design aims to provide an inexpensive solution for locating lost phones, though it has limitations if phones have low battery or are in shadow areas with weak signals.
This document discusses packet sniffing and methods for detecting packet sniffers. It defines packet sniffing as monitoring all network packets and describes common packet sniffer tools like tcpdump. It explains that packet sniffers can be used for both legitimate and malicious purposes, such as password theft or network mapping. The document outlines two key methods for detecting packet sniffers - MAC detection and DNS detection. MAC detection works by sending packets with invalid MAC addresses and checking if any hosts respond in promiscuous mode. DNS detection exploits the behavior of sniffers performing DNS lookups on spoofed source IP addresses. Both methods were found to accurately detect the presence of packet sniffers on a network.
The document provides tips for keeping a network secure, including always keeping virus software and Windows updates enabled, using firewalls, backing up data regularly, and using strong passwords. It warns about common password risks like using obvious words or writing passwords down. The document also covers securing laptops, email, wireless networks, and avoiding risks from open networks. Proper authentication, surge protection, and password protecting are emphasized as important security best practices.
1. Formulate a testing plan with the client to identify systems to evaluate and the scope of testing allowed.
2. Remotely or locally access the target systems to find vulnerabilities by simulating common attacks.
3. Report any found vulnerabilities to the client along with recommendations on how to remedy security issues.
The document describes a sniffer device that can detect and locate lost mobile phones. The sniffer works by creating a small base station that operates at a different frequency than mobile networks. It includes a transceiver, directional antenna, and software to store and check IMEI numbers of lost phones against those in its database. When a lost phone is powered on near the sniffer, it can detect the phone's IMEI number and track its location using GPS. While complex, the sniffer provides an effective and low-cost solution for large-scale detection of lost mobile phones.
This document discusses packet sniffers, which are software applications that can monitor and capture network traffic. It describes how packet sniffers work by putting the network adapter into promiscuous mode to see all network traffic. The document outlines different types of packet sniffers, including commercial and underground varieties. It explains that packet sniffers are used for both legitimate purposes like network debugging and security, as well as illegitimate purposes like hacking. Specific packet sniffer software like Wireshark are profiled, describing their features, capabilities, and limitations. Risks of using packet sniffers like potential security vulnerabilities are also highlighted.
Network security threats are increasing as more people and devices connect to networks. The document identifies ten major network security threats: viruses and worms, Trojan horses, spam, phishing, packet sniffers, maliciously coded websites, password attacks, hardware loss and data fragments, shared computers, and zombie computers/botnets. Each threat is described and potential solutions are provided, such as using security software to block viruses, encryption to prevent packet sniffing, and intrusion prevention systems to counter botnets. Network security managers face ongoing challenges due to the variety of threats and lack of solutions for some issues like password attacks.
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARKIJNSA Journal
Network performance can be a prime concern for network administrators. The performance of the network depends on many factors. Some of the issues faced in the network performance are - Slow Internet, Bottlenecks, Loss of packets and/or retransmissions, and Excessive bandwidth consumption. For troubleshooting a network, an in-depth understanding of network protocols is required. The main objective of this research is to analyze the performance and various other parameters related to the integrity of a network in a home-based network environment using Wireshark. Network traffic is captured for different devices. The captured traffic is then analysed using Wireshark’s basic statistical tools and advanced tools for various performance parameters.
This document summarizes a research paper that proposes a hybrid routing protocol for mobile ad hoc networks (MANETs) that combines proactive and reactive routing approaches. The goal is to provide fast and secure routing in MANETs. The key aspects are:
1) A traffic monitor node manages network traffic and checks if new nodes are malicious. Reactive routing finds paths through new nodes, while proactive routing is used otherwise.
2) The traffic monitor periodically checks node responses to identify malicious nodes and informs the network.
3) Nodes maintain a trust list from the traffic monitor to identify paths that avoid malicious nodes during route discovery.
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
This document summarizes a research study that used the ns-3 network simulator to analyze the performance of two routing protocols - Optimized Link State Routing (OLSR) and Adhoc On-demand Distance Vector (AODV) - in a wireless ad hoc network under different conditions. The study varied parameters like packet size, number of nodes, and hello interval (the frequency at which routing information is broadcast) and measured metrics like throughput, delay, jitter, packet delivery ratio, packet loss, and congestion window. The results showed how the performance of the two protocols was impacted by changes to these parameters. The goal was to better understand congestion control and avoidance in wireless ad hoc networks through simulation.
An efficient ant optimized multipath routing in wireless sensor networkEditor Jacotech
Today, the Wireless Sensor Network is increasingly gaining popularity and importance. It is the more interesting and stimulating area of research. Now, the WSN is applied in object tracking and environmental monitoring applications. This paper presents the self-optimized model of multipath routing algorithm for WSN which considers definite parameters like delay, throughput level and loss and generates the outcomes that maximizes data throughput rate and minimizes delay and loss. This algorithm is based on ANT optimization technique that will bring out an optimal and organized route for WSN and is also to avoid congestion in WSN, the algorithm incorporate multipath capability..
This document summarizes a research paper on reducing packet loss in mobile ad hoc networks (MANETs). The paper discusses how MANETs are vulnerable to various security threats like black hole attacks that can cause packet dropping. It evaluates existing authentication schemes like ACK-based schemes that have overhead issues. The paper then proposes a modified ACK-based scheme using finite state automata to overcome decision ambiguity and minimize packet dropping while authenticating nodes in the MANET. Simulation results show that the proposed approach improves packet delivery ratio, throughput and reduces routing load compared to not using secure authentication.
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
Analyzing performance of zrp by varying node density and transmission rangeAlexander Decker
This document summarizes a simulation study analyzing the performance of the Zone Routing Protocol (ZRP) in mobile ad hoc networks by varying different parameters. The study uses the Network Simulator 2 (NS-2) tool to simulate ZRP under varying node density, transmission range, pause time, sending rate, and node mobility. Key performance metrics like throughput, end-to-end delay, and normalized routing load are measured. The results show that throughput generally increases with higher node density, transmission range, and pause time, while delay and routing load also tend to increase with those factors. Throughput decreases with higher node mobility, while delay decreases and routing load increases.
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
This document discusses migrating packet dropping in mobile ad-hoc networks using a modified ACK-based authentication scheme. It begins by introducing mobile ad-hoc networks and some of the security challenges they face, such as packet dropping attacks. It then discusses existing ACK-based authentication schemes and their limitations, such as generating a large overhead and having ambiguity when nodes refuse acknowledgments. The document proposes a modified ACK-based scheme that uses a secure channel to overcome these limitations and minimize packet dropping. It evaluates the proposed scheme through simulation experiments and finds it improves performance metrics like packet delivery ratio and throughput compared to not using a secure channel. In conclusion, the modified scheme is presented as a way to enhance node authentication and reduce packet dropping in mobile
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
Non-intrusive remote monitoring of data centre services should be such that it does not require
(or minimal) modification of legacy code and standard practices. Also, allowing third party
agent to sit on every server in a data centre is a risk from security perspective. Hence, use of
standard such as SNMPv3 is advocated in this kind of environment. There are many tools (open
source or commercial) available which uses SNMP; but we observe that most of the tools do not
have an essential feature for auto-discovery of network. In this paper we present an algorithm
for remote monitoring of services in a data centre. The algorithm has two stages: 1) auto
discovery of network topology and 2) data collection from remote machine. Further, we
compare SNMP with WBEM and identify some other options for remote monitoring of services
and their advantages and disadvantages.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
1) Computer networks allow computers to communicate and share resources by connecting them through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between computers on a network, both sides must agree on protocols which are sets of rules that govern data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination by choosing appropriate paths through routers. It provides connectionless and connection-oriented services to the transport layer above it.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document describes the simulation and performance evaluation of a wireless ad hoc network using the NS2 simulator. The network uses the AODV routing protocol. 15 nodes were simulated over a 1000m x 800m area for 1000 seconds, with 6 concurrent UDP connections. Packet delivery ratio, throughput, and packet drop ratio were evaluated based on the trace file data. The simulation found a packet delivery ratio of 0.71 and throughput of around 534.19 kbps for the AODV protocol in the simulated network.
Implementation of Spanning Tree Protocol using ns-3Naishil Shah
This document discusses the implementation of the Spanning Tree Protocol (STP) using the ns-3 network simulator. STP is used to prevent bridge loops in layer 2 Ethernet networks. The authors first tried implementing STP by exchanging HELLO messages between nodes but were unsuccessful. They then used Prim's algorithm on the adjacency matrix output from ns-3 to generate a minimum spanning tree and remove loops. NetAnim was used to visualize the topology before and after applying Prim's algorithm.
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying
on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and
communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is
assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc
network form part of the network’s routing infrastructure. The mobility of nodes in an ad-hoc network
denotes that both the public and the topology of the network are extremely active. It is very difficult to
design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more
feasible. A safe and sound protocol should at least include mechanisms against known assault types. In
addition, it should provide a system to easily add new security features in the future. Due to the
significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET
routing protocols.
Intrusion detection techniques for cooperation of node in MANET have been chosen as the security
parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in
which Reputation concerning every node is measured and will be move to every node in network.
Reputation is defined as Someone’s donation to network operation. CONFIDANT [23], CORE [25],
OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
A Survey on different Port Scanning Methods and the Tools used to perform the...Naomi Hansen
This document summarizes different port scanning methods and tools used to perform them. It describes non-stealth scanning (TCP connect), inverse mapping scanning, slow scanning, SYN scanning, FIN scanning, Xmas tree scanning, null scanning, UDP scanning, and idle scanning. For each method, it provides details on how the method works, advantages/disadvantages, and example tools that can be used to implement the scanning method. The document is intended to inform readers about various port scanning techniques and their characteristics.
Packet capturing software works by intercepting and logging network traffic. It sets the network interface card to promiscuous mode to read all incoming packets. Packet sniffers passively receive data frames and can be used to troubleshoot networks, but they also allow sensitive data like usernames and passwords to be intercepted if in the wrong hands. Detection methods involve sending fake network traffic and monitoring for unauthorized duplication of responses to identify potential sniffing software.
The document summarizes research on preserving source location privacy in wireless sensor networks. It proposes using computer-based image recognition to analyze traffic patterns and detect modified data packets. The key points are:
1) Wireless sensor networks are vulnerable to traffic analysis attacks that can reveal the location of data sources. Existing solutions have limitations like increased energy use.
2) The paper proposes using computer-based image recognition to analyze traffic and identify packets whose delivery was delayed, indicating modification by an attacker.
3) If the attacking node is identified, it would be removed from the network. This approach aims to effectively preserve source location privacy against traffic analysis attacks.
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
Wireless sensor networks determine probable in military, environments, health and commercial
applications. The process of transferring of information from a remote sensor node to other nodes in a
network holds importance for such applications. Various constraints such as limited computation, storage
and power makes the process of transferring of information routing interesting and has opened new arenas
for researchers. The fundamental problem in sensor networks states the significance and routing of
information through a real path as path length decides some basic performance parameters for sensor
networks. This paper strongly focuses on a shortest path algorithm for wireless adhoc networks. The
simulations are performed on NS2 and the results obtained discuss the role of transferring of information
through a shortest path.
This document analyzes the performance of three routing protocols - AODV, OLSR, and ZRP - under a blackhole security attack in a mobile ad hoc network (MANET). It defines the blackhole attack and describes how each protocol functions. Simulations are run in OPNET with 40 nodes using various performance metrics like network load, end-to-end delay, and packet delivery ratio. The results show that while all protocols are negatively impacted by blackhole nodes, AODV maintains the most consistent performance under attack compared to OLSR and ZRP.
Performance measurement of MANET routing protocols under Blackhole security a...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Entomology has been deeply rooted in various cultures since prehistoric times for the purpose of
agriculture. Nowadays, many scientists are interested in the field of biodiversity in order to maintain the
diversity of species within our ecosystem. Out of 1.3 million known species on this earth, insects account
for more than two thirds of these known species. Since 400 million years ago, there have been various
kinds of interactions between humans and insects. There have been several attempts to create a method to
perform insect identification accurately. Great knowledge and experience on entomology are required for
accurateinsect identification. Automation of insect identification is required because there is a shortage of
skilled entomologists. This paper provides a review of the past literature in vision-based insect recognition
and classifications. Over the past decades, automatic insect recognition and classification has been given
extra attention especially in term of crop pest and disease control. This paper details advances in insect
recognition, discussing representative works from different types of method and classifiers
algorithm.Among the method used in the previous research includes color histogram, edge detection and
feature extraction (SIFT vector). We provides discussion on the state-of-the-art and provides perspective
on future research direction in insect recognition and classification problem.
A survey on cost effective survivable network design in wireless access networkijcses
In today’s technology, the essential property for wireless communication network is to exhibit as a
dependable network. The dependability network incorporates the property like availability, reliability and
survivability. Although these factors are well taken care by protocol for wired network, still there exists
huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with
difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access
network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access
network is very important factor to be considered will performing wireless network designing. This paper
focuses on discussion of survivability in wireless access network. Capability of a wireless access network to
perform its dedicated accessibility services even in case of infrastructure failure is known as survivability.
Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to
minimize the overall connection cost for multiple requests. The various failure scenario of wireless access
network as existing in literature is been explored. The existing survivability models for access network like
shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail
here. Further comparison between various existing survivability solutions is also tabulated.
A comparative survey based on processing network traffic data using hadoop pi...ijcses
Big data analysis has now become an integral part of many computational and statistical departments.
Analysis of peta-byte scale of data is having an enhanced importance in the present day scenario. Big data
manipulation is now considered as a key area of research in the field of data analytics and novel
techniques are being evolved day by day. Thousands of transaction requests are being processed in every
minute by different websites related to e-commerce, shopping carts and online banking. Here comes the
need of network traffic and weblog analysis for which Hadoop comes as a suggested solution. It can
efficiently process the Netflow data collected from routers, switches or even from website access logs at
fixed intervals.
ADAPTIVE MAP FOR SIMPLIFYING BOOLEAN EXPRESSIONSijcses
The complexity of implementing the Boolean functions by digital logic gates is directly related to the
complexity of the Boolean algebraic expression. Although the truth table is used to represent a function,
when it is expressed algebraically it appeared in many different, but equivalent, forms. Boolean expressions
may be simplified by Boolean algebra. However, this procedure of minimization is awkward because it
lacks specific rules to predict each succeeding step in the manipulative process. Other methods like Map
methods (Karnaugh map (K-map), and map Entered Variables) are useful to implement the Boolean
expression with minimal prime implicants. Or the Boolean function can be represents and design by used
type N’s Multiplexers by partitioned variable(s) from the function. An adaptive map is a combined method
of Boolean algebra and K-map to reduce and minimize Boolean functions involving more than three
Boolean variables
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
Neural network based numerical digits recognization using nnt in matlabijcses
Artificial neural networks are models inspired by human nervous system that is capable of learning. One of
the important applications of artificial neural network is character Recognition. Character Recognition
finds its application in number of areas, such as banking, security products, hospitals, in robotics also.
This paper is based on a system that recognizes a english numeral, given by the user, which is already
trained on the features of the numbers to be recognized using NNT (Neural network toolbox) .The system
has a neural network as its core, which is first trained on a database. The training of the neural network
extracts the features of the English numbers and stores in the database. The next phase of the system is to
recognize the number given by the user. The features of the number given by the user are extracted and
compared with the feature database and the recognized number is displayed.
Congestion control in packet switched wide area networks using a feedback modelijcses
In a complex world, where networking expands very rapidly, the network stability of flow of bandwidth
played a vital role in transmitting packets. Hence, it was imperative to find solution to the problem of
congestion especially in the follow of bandwidth stability.
Congestion in computer networking is caused by so many factors. Some of the signs are packet loss,
queuing delay resulting from overloading the buffer, faulty hardware devices, intermixing of old and new
technologies and unstable flow of bandwidth resulting from positive feedback
This document provides a list of the most cited articles from the International Journal of Computer science and engineering Survey (IJCSES) for the years 2010-2012. It includes the article titles, authors, publication details, and digital object identifiers. The articles cover topics related to wireless sensor networks, machine learning, computer security, grid computing, and biometrics. In total, over 20 highly cited articles from the journal are referenced, providing researchers with influential works across various domains of computer science and engineering.
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKSijcses
Nodes in Mobile Ad-hoc network are connected wirelessly and the network is auto configuring [1]. This paper introduces the usefulness of data warehouse as an alternative to manage data collected by WSN.Wireless Sensor Network produces huge quantity of data that need to be proceeded and homogenised, so as to help researchers and other people interested in the information. Collected data is managed and compared with other coming from datasources and systems could participate in technical report and decision making. This paper proposes a model to design, extract, transform and normalize data collected by Wireless Sensor Networks by implementing a multidimensional warehouse for comparing many aspects in WSN such as (routing protocol[4], sensor, sensor mobility, cluster ….). Hence, data warehouse defined and applied to the context above is presented as a useful approach that gives specialists row data and information for decision processes and navigate from one aspect to another.
A survey of real-time routing protocols For wireless sensor networksijcses
This document summarizes a survey of real-time routing protocols for wireless sensor networks. It discusses several existing real-time routing protocols, including AODV, DSR, RAP, SPEED, and MMSPEED. For each protocol, it describes the key mechanisms, advantages, and disadvantages. It focuses on factors like end-to-end delay, energy consumption, mobility, scalability, and challenges for future research in real-time routing protocols for wireless sensor networks. The document provides a comparative analysis of the protocols to highlight their strengths and weaknesses in meeting the demands of real-time applications.
Artificial intelligence markup language: a Brief tutorialijcses
The document describes an introduction to the Artificial Intelligence Markup Language (AIML) and how it can be used to develop chatterbots. It provides an overview of chatterbots and pattern recognition techniques. It then describes the basic structure and tags of the AIML language such as <aiml>, <category>, <pattern>, and <template>. Examples are given to illustrate how dialogue patterns can be modeled using these tags. The document aims to serve as a reference guide for developing chatterbots using the AIML language.
The objective of this paper is to present the hybrid approach for edge detection. Under this technique, edge
detection is performed in two phase. In first phase, Canny Algorithm is applied for image smoothing and in
second phase neural network is to detecting actual edges. Neural network is a wonderful tool for edge
detection. As it is a non-linear network with built-in thresholding capability. Neural Network can be trained
with back propagation technique using few training patterns but the most important and difficult part is to
identify the correct and proper training set.
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCEijcses
In order to solve the low efficiency problem of large-scale distributed software testing , CBDSTP(
Cloud-Based Distributed Software Testing Platform) is put forward.This platform can provide continous
integration and automation of testing for large software systems, which can make full use of resources on
the cloud clients, achieving testing result s in the real environment and reasonable allocating testing jobs,
to resolve the Web application software configuration test, compatibility test and distributed test problems,
to reduce costs, improve efficiency. Through making MySQL testing on this prototype system, the
verification is made for platform architecture and job allocation effectiveness.
PHYSICAL MODELING AND SIMULATION OF THERMAL HEATING IN VERTICAL INTEGRATED ...ijcses
Interconnect is one of the main performance determinant of modern integrated circuits (ICs). The new
technology of vertical ICs places circuit blocks in the vertical dimension in addition to the conventional
horizontal plane. Compared to the planar ICs, vertical ICs have shorter latencies as well as lower power
consumption due to shorter wires. This also increases speed, improves performances and adds to ICs
density. The benefits of vertical ICs increase as we stack more dies, due to successive reductions in wire
lengths. However, as we stack more dies, the lattice self-heating becomes a challenging and critical issue
due to the difficulty in cooling down the layers away from the heat sink. In this paper, we provide a
quantitative electro-thermal analysis of the temperature rise due to stacking. Mathematical models based
on steady state non-isothermal drift-diffusion transport equations coupled to heat flow equation are used.
These physically based models and the different heat sources in semiconductor devices will be presented
and discussed. Three dimensional numerical results did show that, compared to the planar ICs, the
vertical ICs with 2-die technology increase the maximum temperature by 17 Kelvin in the die away from
the heat sink. These numerical results will also be presented and analyzed for a typical 2-die structure of
complementary metal oxide semiconductor (CMOS) transistors.
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...Aaryan Kansari
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generative AI
Discover Agentic AI, the revolutionary step beyond reactive generative AI. Learn how these autonomous systems can reason, plan, execute, and adapt to achieve human-defined goals, acting as digital co-workers. Explore its promise, key frameworks like LangChain and AutoGen, and the challenges in designing reliable and safe AI agents for future workflows.
Sticky Note Bullets:
Definition: Next stage beyond ChatGPT-like systems, offering true autonomy.
Core Function: Can "reason, plan, execute and adapt" independently.
Distinction: Proactive (sets own actions for goals) vs. Reactive (responds to prompts).
Promise: Acts as "digital co-workers," handling grunt work like research, drafting, bug fixing.
Industry Outlook: Seen as a game-changer; Deloitte predicts 50% of companies using GenAI will have agentic AI pilots by 2027.
Key Frameworks: LangChain, Microsoft's AutoGen, LangGraph, CrewAI.
Development Focus: Learning to think in workflows and goals, not just model outputs.
Challenges: Ensuring reliability, safety; agents can still hallucinate or go astray.
Best Practices: Start small, iterate, add memory, keep humans in the loop for final decisions.
Use Cases: Limited only by imagination (e.g., drafting business plans, complex simulations).
As data privacy regulations become more pervasive across the globe and organizations increasingly handle and transfer (including across borders) meaningful volumes of personal and confidential information, the need for robust contracts to be in place is more important than ever.
This webinar will provide a deep dive into privacy contracting, covering essential terms and concepts, negotiation strategies, and key practices for managing data privacy risks.
Whether you're in legal, privacy, security, compliance, GRC, procurement, or otherwise, this session will include actionable insights and practical strategies to help you enhance your agreements, reduce risk, and enable your business to move fast while protecting itself.
This webinar will review key aspects and considerations in privacy contracting, including:
- Data processing addenda, cross-border transfer terms including EU Model Clauses/Standard Contractual Clauses, etc.
- Certain legally-required provisions (as well as how to ensure compliance with those provisions)
- Negotiation tactics and common issues
- Recent lessons from recent regulatory actions and disputes
Contributing to WordPress With & Without Code.pptxPatrick Lumumba
Contributing to WordPress: Making an Impact on the Test Team—With or Without Coding Skills
WordPress survives on collaboration, and the Test Team plays a very important role in ensuring the CMS is stable, user-friendly, and accessible to everyone.
This talk aims to deconstruct the myth that one has to be a developer to contribute to WordPress. In this session, I will share with the audience how to get involved with the WordPress Team, whether a coder or not.
We’ll explore practical ways to contribute, from testing new features, and patches, to reporting bugs. By the end of this talk, the audience will have the tools and confidence to make a meaningful impact on WordPress—no matter the skill set.
Evaluation Challenges in Using Generative AI for Science & Technical ContentPaul Groth
Evaluation Challenges in Using Generative AI for Science & Technical Content.
Foundation Models show impressive results in a wide-range of tasks on scientific and legal content from information extraction to question answering and even literature synthesis. However, standard evaluation approaches (e.g. comparing to ground truth) often don't seem to work. Qualitatively the results look great but quantitive scores do not align with these observations. In this talk, I discuss the challenges we've face in our lab in evaluation. I then outline potential routes forward.
SAP Sapphire 2025 ERP1612 Enhancing User Experience with SAP Fiori and AIPeter Spielvogel
Explore how AI in SAP Fiori apps enhances productivity and collaboration. Learn best practices for SAPUI5, Fiori elements, and tools to build enterprise-grade apps efficiently. Discover practical tips to deploy apps quickly, leveraging AI, and bring your questions for a deep dive into innovative solutions.
Unlock your organization’s full potential with the 2025 Digital Adoption Blueprint. Discover proven strategies to streamline software onboarding, boost productivity, and drive enterprise-wide digital transformation.
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025Lorenzo Miniero
Slides for my "Multistream support in the Janus SIP and NoSIP plugins" presentation at the OpenSIPS Summit 2025 event.
They describe my efforts refactoring the Janus SIP and NoSIP plugins to allow for the gatewaying of an arbitrary number of audio/video streams per call (thus breaking the current 1-audio/1-video limitation), plus some additional considerations on what this could mean when dealing with application protocols negotiated via SIP as well.
Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025Nikki Chapple
Session | Protecting Your Sensitive Data with Microsoft Purview: Practical Information Protection and DLP Strategies
Presenter | Nikki Chapple (MVP| Principal Cloud Architect CloudWay) & Ryan John Murphy (Microsoft)
Event | IRMS Conference 2025
Format | Birmingham UK
Date | 18-20 May 2025
In this closing keynote session from the IRMS Conference 2025, Nikki Chapple and Ryan John Murphy deliver a compelling and practical guide to data protection, compliance, and information governance using Microsoft Purview. As organizations generate over 2 billion pieces of content daily in Microsoft 365, the need for robust data classification, sensitivity labeling, and Data Loss Prevention (DLP) has never been more urgent.
This session addresses the growing challenge of managing unstructured data, with 73% of sensitive content remaining undiscovered and unclassified. Using a mountaineering metaphor, the speakers introduce the “Secure by Default” blueprint—a four-phase maturity model designed to help organizations scale their data security journey with confidence, clarity, and control.
🔐 Key Topics and Microsoft 365 Security Features Covered:
Microsoft Purview Information Protection and DLP
Sensitivity labels, auto-labeling, and adaptive protection
Data discovery, classification, and content labeling
DLP for both labeled and unlabeled content
SharePoint Advanced Management for workspace governance
Microsoft 365 compliance center best practices
Real-world case study: reducing 42 sensitivity labels to 4 parent labels
Empowering users through training, change management, and adoption strategies
🧭 The Secure by Default Path – Microsoft Purview Maturity Model:
Foundational – Apply default sensitivity labels at content creation; train users to manage exceptions; implement DLP for labeled content.
Managed – Focus on crown jewel data; use client-side auto-labeling; apply DLP to unlabeled content; enable adaptive protection.
Optimized – Auto-label historical content; simulate and test policies; use advanced classifiers to identify sensitive data at scale.
Strategic – Conduct operational reviews; identify new labeling scenarios; implement workspace governance using SharePoint Advanced Management.
🎒 Top Takeaways for Information Management Professionals:
Start secure. Stay protected. Expand with purpose.
Simplify your sensitivity label taxonomy for better adoption.
Train your users—they are your first line of defense.
Don’t wait for perfection—start small and iterate fast.
Align your data protection strategy with business goals and regulatory requirements.
💡 Who Should Watch This Presentation?
This session is ideal for compliance officers, IT administrators, records managers, data protection officers (DPOs), security architects, and Microsoft 365 governance leads. Whether you're in the public sector, financial services, healthcare, or education.
🔗 Read the blog: https://nikkichapple.com/irms-conference-2025/
Dev Dives: System-to-system integration with UiPath API WorkflowsUiPathCommunity
Join the next Dev Dives webinar on May 29 for a first contact with UiPath API Workflows, a powerful tool purpose-fit for API integration and data manipulation!
This session will guide you through the technical aspects of automating communication between applications, systems and data sources using API workflows.
📕 We'll delve into:
- How this feature delivers API integration as a first-party concept of the UiPath Platform.
- How to design, implement, and debug API workflows to integrate with your existing systems seamlessly and securely.
- How to optimize your API integrations with runtime built for speed and scalability.
This session is ideal for developers looking to solve API integration use cases with the power of the UiPath Platform.
👨🏫 Speakers:
Gunter De Souter, Sr. Director, Product Manager @UiPath
Ramsay Grove, Product Manager @UiPath
This session streamed live on May 29, 2025, 16:00 CET.
Check out all our upcoming UiPath Dev Dives sessions:
👉 https://community.uipath.com/dev-dives-automation-developer-2025/
Agentic AI - The New Era of IntelligenceMuzammil Shah
This presentation is specifically designed to introduce final-year university students to the foundational principles of Agentic Artificial Intelligence (AI). It aims to provide a clear understanding of how Agentic AI systems function, their key components, and the underlying technologies that empower them. By exploring real-world applications and emerging trends, the session will equip students with essential knowledge to engage with this rapidly evolving area of AI, preparing them for further study or professional work in the field.
Introducing the OSA 3200 SP and OSA 3250 ePRCAdtran
Adtran's latest Oscilloquartz solutions make optical pumping cesium timing more accessible than ever. Discover how the new OSA 3200 SP and OSA 3250 ePRC deliver superior stability, simplified deployment and lower total cost of ownership. Built on a shared platform and engineered for scalable, future-ready networks, these models are ideal for telecom, defense, metrology and more.
Droidal: AI Agents Revolutionizing HealthcareDroidal LLC
Droidal’s AI Agents are transforming healthcare by bringing intelligence, speed, and efficiency to key areas such as Revenue Cycle Management (RCM), clinical operations, and patient engagement. Built specifically for the needs of U.S. hospitals and clinics, Droidal's solutions are designed to improve outcomes and reduce administrative burden.
Through simple visuals and clear examples, the presentation explains how AI Agents can support medical coding, streamline claims processing, manage denials, ensure compliance, and enhance communication between providers and patients. By integrating seamlessly with existing systems, these agents act as digital coworkers that deliver faster reimbursements, reduce errors, and enable teams to focus more on patient care.
Droidal's AI technology is more than just automation — it's a shift toward intelligent healthcare operations that are scalable, secure, and cost-effective. The presentation also offers insights into future developments in AI-driven healthcare, including how continuous learning and agent autonomy will redefine daily workflows.
Whether you're a healthcare administrator, a tech leader, or a provider looking for smarter solutions, this presentation offers a compelling overview of how Droidal’s AI Agents can help your organization achieve operational excellence and better patient outcomes.
A free demo trial is available for those interested in experiencing Droidal’s AI Agents firsthand. Our team will walk you through a live demo tailored to your specific workflows, helping you understand the immediate value and long-term impact of adopting AI in your healthcare environment.
To request a free trial or learn more:
https://droidal.com/
Offshore IT Support: Balancing In-House and Offshore Help Desk Techniciansjohn823664
In today's always-on digital environment, businesses must deliver seamless IT support across time zones, devices, and departments. This SlideShare explores how companies can strategically combine in-house expertise with offshore talent to build a high-performing, cost-efficient help desk operation.
From the benefits and challenges of offshore support to practical models for integrating global teams, this presentation offers insights, real-world examples, and key metrics for success. Whether you're scaling a startup or optimizing enterprise support, discover how to balance cost, quality, and responsiveness with a hybrid IT support strategy.
Perfect for IT managers, operations leads, and business owners considering global help desk solutions.
ECS25 - The adventures of a Microsoft 365 Platform Owner - Website.pptxJasper Oosterveld
An Approach to Detect Packets Using Packet Sniffing
1. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
DOI : 10.5121/ijcses.2013.4302 21
An Approach to Detect Packets Using Packet
Sniffing
Rupam1
, Atul Verma2
, Ankita Singh3
Department of Computer Science, Sri Ram Swroop Memorial Group of Professional
Colleges Tiwari Gang Faizabad Road, Lucknow, Uttar Pradesh, India.
1
[email protected]
2
[email protected]
3
[email protected]
ABSTRACT
In the past decades computer network have kept up growing in size, complexity and along with it the
number of its user is also being increased day by day. Hence the amount of network traffic flowing at each
node has increased drastically. So to keep a track on these nodes a packet sniffer is used. Sometimes a
packet sniffer is called a network monitor or network analyzer. Many system administrator or network
administrator use it for monitoring and troubleshooting network traffic. Packet sniffers are useful for both
wired and wireless networks. The purpose of this paper is to show the basics of packet sniffer, how it works
in both switched and non switched environment, its practical approach, its positive vs negative aspects and
its safe guards.
KEYWORDS
Network monitor, switched environment, non switched environment, promiscuous mode, spoofing and
intrusion.
1. INTRODUCTION
Packet sniffing is defined as a technique that is used to monitor every packet that crosses the
network. A packet sniffer is a piece of hardware or software that monitors all network traffic [3].
Using the information captured by the packet sniffers an administrator can identify erroneous
packets and use the data to pinpoint bottlenecks and help to maintain efficient network data
transmission [2]. For most organizations packet sniffer is largely an internal threat.
Packet sniffers can be operated in both switched and non switched environment. [4]
Determination of packet sniffing in a non switched environment is a technology that can be
understand by everyone. In this technology all hosts are connected to a hub. There are a large
number of commercial and non commercial tools are available that makes possible
eavesdropping of network traffic. Now a problem comes that how this network traffic can be
eavesdrop; this problem can be solved by setting network card into a special “promiscuous
mode”. [4] Now businesses are updating their network infrastructure, replacing aging hubs with
new switches. The replacement of hub with new switches that makes switched environment is
widely used because “it increases security”. However, the thinking behind is somewhat flawed. It
cannot be said that packet sniffing is not possible in switched environment. It is also possible in
switched environment.
2. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
22
2. HOW PACKET SNIFFER WORKS
Packet sniffer’s working can be understood in both switched and non switched environment. For
setup of a local network there exist machines. These machines have its own hardware address
which differs from the other [2].
When a non switched environment is considered then all nodes are connected to a hub which
broadcast network traffic to everyone. So as soon as a packet comes in the network, it gets
transmitted to all the available hosts on that local network. Since all computers on that local
network share the same wire, so in normal situation all machines will be able to see the traffic
passing through. When a packet goes to a host then firstly network card checks it MAC address,
if MAC address matches with the host’s MAC address then the host will be able to receive the
content of that packet otherwise it will forward the packet to other host connected in the network.
Now here a need arises to see the content of all packets that passes through the host. Thus we can
say that when a host or machine’s NIC is setup in promiscuous mode then all the packets that is
designed for other machines, is captured easily by that host or machine.
Figure 1: IEEE 802.3 network
When a switched environment is considered then all hosts are connected to a switch instead of a
hub, it is called a switched Ethernet also. Since in switched environment packet sniffing is more
complex in comparison to non switched network, because a switch does not broadcast network
traffic. Switch works on unicast method, it does not broadcast network traffic, it sends the traffic
directly to the destination host. This happens because switches have CAM Tables. These tables
store information like MAC addresses, switch port and VLAN information [5][6]. [5] To
understand working of packet sniffer in switched environment, an ARP cache table is considered.
This is a table that stores both MAC addresses and IP addresses of the corresponding hosts. This
table exists in local area network. Before sending traffic a source host should have its destination
host, this destination host is checked in the ARP cache table. If destination host is available in the
ARP cache then traffic will be sent to it through a switch, but if it is not available in the ARP
cache then source host sends a ARP request and this request is broadcasted to all the hosts. When
the host replies the traffic can be send to it. This traffic is sent in two parts to the destination host.
First of all it goes from the source host to the switch and then switch transfers it directly on the
destination host. So sniffing is not possible.
There are several methods through which we can sniff traffic in switched environment.
These methods are:-
2.1. ARP Cache Poisoning
ARP Cache Poisoning can be better explained by an example “man-in-the-middle-attack”.
Hub/Switch
Node1 Node2
Node3 Node4
3. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
23
Figure 2: man-in-middle attack
Suppose we have 3 hosts x, y, z. Host x and y are connected through a switch and they normally
communicate. Assume that z wants to see the communication between x and y. When, x sends
traffic which is destined for y it is intercepted by z. z passes this information on to y, pretending
that it came from x. This is achieved by ARP Cache Poisoning.
2.2. CAM Table Flooding
[5] Content addressable memory table works by flooding the CAM tables. CAM table is a table
that stores information like MAC addresses and switch port along with their Virtual LAN
information. A certain number of eateries are stored by CAM table due to of being its fix size. As
its name implies “CAM table flooding” here flooding means floods the switch with MAC
addresses and this is repeated till a point atwhere switch starts to broadcast network traffic.
[5][7]. Now it becomes easy to sniff the packets.
2.3. Switch Port Stealing
[5]As its name implies “switch port stealing” here in this method we have to steal the switches
port of that host for which traffic is designed to send. When this switch port is stolen by the user
then user will be able to sniff the traffic because traffic goes through the switch port first, then to
the target host [5].
3. SNIFFING METHODS
Three types of sniffing methods are used. These are:
3.1. IP Based Sniffing
[3] IP based sniffing is the most commonly used method of packet sniffing. In this method a
requirement of setting network card into promiscuous mode exist. When network card is set into
promiscuous mode then host will be able to sniff all packets. A key point in the IP based sniffing
is that it uses an IP based filter, and the packets matching the IP address filter is captured only.
Normally the IP address filter is not set so it can capture all the packets. This method only works
in non switched network [3].
X
Switch
Y
Z
4. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
24
3.2. MAC based Sniffing
[3]This is another method of packet sniffing. This is as like IP based sniffing. Same concept of IP
based sniffing is also used here besides using an IP based filter. Here also a requirement of
setting network card into promiscuous mode exists. Here in place of IP address filter a MAC
address filter is used and sniffing all packets matching the MAC addresses [3].
3.3. ARP based Sniffing
[3] This method works a little different. It does not put the network card into promiscuous mode.
This is not necessary because ARP packets will be sent to us. This is an effective method for
sniffing in switched environment. Here sniffing is possible due to of being stateless nature of
Address Resolution Protocol [3].
4. PRACTICAL APPROACH
A practical approach of this title is developed by us in which we have shown actual packet
capturing. This approach is mostly developed for:
1. To make data identity stealing available by tracing the packets from the network.
2. To provide an easy and effective way of sniffing of data packets.
3. To provide a user friendly environment.
4. It is possible only when the server code is running.
4.1. System Analysis
For making a system analysis we should first of all state the requirements of the system. A
requirement should be open and it must be defined in detail. There are many types of
requirements available: user requirement, system requirement.
When all these requirements are gathered then we make a documentation of these requirements,
this is called “system requirement specification”. Now the SRS for our application will be as-
1. Recognize layers and this layer can be Network layer.
2. Recognize layers and this layer can be Transport layer.
3. Recognize layers and this layer can be Application layer.
4. Recognize protocol that is simply UDP protocol.
5. Recognize protocol that is simply TCP protocol.
6. Recognize protocol that is simply HTTP protocol.
7. Analyze free memory size.
8. Find out the packets over a network.
Problem statement should state what we have to achieve and how it can be achieved. For the
achievement of desired system we should keep a consideration on our needs, we should have to
develop a user manual for the desired system and besides it we have to short list those features
which are mandatory and then we have to consider those features which are optional. For better
visualization and for providing a user friendly environment we should develop a proper
designing. These designs are developed according to our requirements. So if requirements are not
specified properly or it includes lack of analysis then designing process suffers from lack of
generation of desired system. It should follow some software engineering standards.
5. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
25
Feasibility analysis is also an important part of system analysis. We should have to know that our
system is feasible in the following environment or not. These environments include Technical
feasibility, operational feasibility and economical feasibility. Technical feasibility, that is
commonly known to all that the desired system that we are going to develop should be
technically feasible. Operational feasibility indicates that system’s operation will be properly
used or not. So as like technical and operational feasibility economical feasibility indicate that is
it possible to develop the system in our desired budget.
4.2. Existing System
Existing system supports only the packet capturing there is no sniffing concept. It can show only
the captured packet in the network and it can show only the size of the packet. In this application
it cannot show the source machine and destination machine which are involved in the packet
transferring.
4.3. Proposed System
In this application it can show the “packet sniffing” concept. In this manner it can show the
captured packets and size of the packet and source and destination machine IP addresses which
are involved in the packet transferring. It can show this process in graphical manner. It can show
the working of different layers in graphical manner. It can give the complete information about
the captured packet like which layers are involved and which protocols are involved at that time.
And you have a facility to store the information of the packets. It can show the ratio of different
layers in graph.
For developing this application we have made five modules they are as:
1. User Interface module
2. Packet sniffing module
3. Analyze layer module
4. Analyze protocol module
5. Free memory module
After summarizing all modules, output comes by using mixed approach of all modules. Now we
connect our system into a Local Area Network, after connecting when we run this application
then output comes as:
6. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
26
Figure 3: Practical approach 1.
All incoming and outgoing packet’s time, its protocol analysis and what it contains source
address and what is its destination address and actual size of the packets are shown by this
window. Now if we want to know the detailed information of any packet then we choose it,
another window opens showing the detailed information of that particular packet.
Figure 4: Practical approach 2
7. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
27
Detailed information of packet contains information as like timing of coming of packet, source
addresses of the packet, destination addresses of the packet, protocol information, time to live of
packets, version information, header length, precedence, Delay information, Throughput,
Reliability, Total length of packet, Identification and Checksum along with the contents of the
packets.
Figure 5: Practical approach 3
Now we can edit the content of packet and we can transfer again this modified packet in the
network. We can store all packets information in the buffer for further analysis.
8. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
28
Figure 6: Practical approach 4
This application may be previously developed but this contains a problem. It is not much feasible
for those users who are unknown about the concepts of IP addresses, MAC addresses and
promiscuous mode etc. So due to of being unaware they could not understand what is going on
exactly. So here we are developing a new concept of providing administrator’s name also. As we
know that in big organization each system are allotted to a particular user. So to keep a track that
which activity is performing by which user is possible to know. When a new user uses this
application then he can easily understand that a person sitting at system x what is accessing.
5. POSITIVE ASPECT
This application keeps both positive and negative aspects. Its positive aspects can be defined as:
5.1. Network traffic analysis
Traffic analysis is the process of intercepting and examining messages in order to deduce
information. It can be performed even on when the messages are encrypted and cannot be
decrypted. Traffic analysis comes in computer security. Now a question arises why this traffic
analysis is performed. It is performed in the context of military intelligence or counter
intelligence. If an attacker wants to gain information, this information may be important
information. Then to gain important information he has to monitor the frequency and timing of
network packets. A passive network monitoring is being used by network IDS devices to detect
possible threats. This passive monitoring is much more beneficial for a security admin. He get the
knowledge of network topologies, he get the knowledge about available services, information
about operating systems besides it he will be able to get information about type of vulnerabilities
[1].
Network traffic can be analyzed by a network analyzer. A network analyzer is also called a
protocol analyzer or packet analyzer. Network analyzer is a hardware device that provides
security against malicious activity.
9. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
29
Network analyzer can:-
1. Provide detail information of activities that is going on the network.
2. Test anti-malware programs and pin-point potential vulnerabilities.
3. Detect unusual packet characteristics.
4. Identify packet sources or destination.
5. Configure alarm for defined threat.
6. Search of specific data string in packets.
7. It captures all the information and displays it
Figure 7: Network traffic analysis
Network analyzer is mostly used in comparison to other techniques because it gives assurance to
minimize the probability of an attack.
5.2 In Intrusion Detection
Now a day, no one can live without using internet due to of its services available. Its users are
increasing day by day. In such increasing environment there are many chances of being an
intrusion. To handle these intrusions an appropriate intrusion detection system is used. In big
organizations existence of intrusion detection is necessary. Intrusion Detection is the active or
continuous action to detect intrusive acts. So a packet sniffer is used in intrusion detection
through which it can monitor network or system activities for malicious activities. Intrusion
detection is useful due to of following reason:
1. New and new softwares are developed every day. Sometimes they suffer from occurrences of
bugs. So intrusion detection is useful to resolve these bugs.
2. As we know that internet size is increasing day by day and number of its users is also
increasing. So to keep a track on system abuses an intrusion detection system is used.
3. In big organizations to keep a track on occurrence of an intrusion, Intrusion Detection system
is established.
6. TOOLS FOR INTRUSION DETECTION
There are various tools for intrusion detection:
6.1. Computer Oracle and Password System
This is a technique that is used as a tool for Intrusion detection. As its name implies it is used to
check passwords and startup devices besides it, it is also used for checking file permissions.
10. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
30
These checkings are performed by a normal user. COPS then use comparison to determine if any
anomalies have occurred.
Many security tools that are basically designed for UNIX systems, administrator, programmer,
operator or consultant in the neglected area of the computer security are combined to make
COPS. [8] There are twelve small security check programs which are integrated by COPS.
These programs look for:
1. File directory and device permission/modes.
2. Poor passwords.
3. Security of passwords.
4. Programs and files run in /etc/rc*
.
5. Existence of SUID files, their writability.
6. A CRC check against important binaries or key files.
7. Anonymous ftp setup.
8. Unrestricted tftp, decode alias in send mail, SUID uudecode problems, hidden shells.
9. Miscellaneous root checks.
10. Checking dates of CERT advisories versus key files.
11. Writability of user’s home directories and startup files.
12. The kuang expert system.
6.2. Tripwire
Tripwire is a tool that is basically used for intrusion detection. Each database/system has several
files and every modification in these files is monitored by a security utility. This utility is called
Tripwire. This monitoring is done by maintaining digital signature of each file. Using these
signatures, tripwire checks file integrity. There are many digital signature algorithms that are
offered by Tripwire. When Tripwire creates digital signature for important files then this
signature is checked against checksums. If a difference is found, it simply means there have been
some changes in the files by an intruder.
6.3. Tiger
It is similar to COPS. [9]Tiger is a type of security tool. It is used not only as a security audit but
also it is used as an intrusion detection system. Multiple UNIX platforms are supported by tiger.
It is freely available and if we want to take it then we should go through the GPL License
process. When it is compared from other tool then we get that it needs only of POSIX tools and
these tools are written in shell language. Along with various applications it has some interesting
features that show its resurrection and this resurrection includes a modular design that is easy to
expand and it has a double edge where it can be used as an audit tool and as a host intrusion
detection tool. There are many ways in which free software intrusion detection is currently going.
These ways goes from network IDS to the kernel but there is a case, that it does not mention file
integrity checkers and log checkers. This tool is complemented by tiger and provides a
framework for together working. Tiger can be freely downloaded from savannah.
7. NEGETIVE ASPECT
Sniffing programs are found in two forms: Commercial packet sniffer and Underground packet
sniffer. Commercial packet sniffer has positive aspect because it is used in maintaining network
whereas underground packet sniffer has negative aspect because it is mostly used by attackers to
11. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
31
gain unauthorized access to remote host [3]. Thus we see that this application has some negative
aspects too.
7.1. Unauthorized access
When we perform sniffing then content of packets is viewed by us. Since all the contents are in
encrypted form but they can be decrypted by hackers by implementing a hacking table. If packet
contains some private information such as anyone’s user name and password then hackers may
use it to gain authorized access.
7.2. Posting a threat
When network traffic is analyzed then we can post some malicious activity. Packet sniffing is a
well known example of intrusion methods.
7.3. IP Spoofing
To gain unauthorized access to machines, IP spoofing is a powerful technique. Here an intruder
sends messages to a computer with an IP address. And this IP address indicates that the message
is coming from a trusted host. This is used for:
1. Reprogramming routers
2. Denial of service attack
7.4. Man-in-middle attack
This is a well known example of ARP Spoofing. This is also known as a Bucket bridge attack, or
sometimes Janus attack. Computer security is a form of active eavesdropping in which the
attacker makes independent connections with the victims and relays messages between them,
making them believe that they are talking directly to each other over a private connection, when
in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept
all messages going between the two victims and inject new ones.
8. SAFE GUARDS
There are many ways through which we can protect our packets. One of them is by using
encryption. There are three ways to apply encryption on packets.
8.1. Link-level encryption
Encryption mechanism is applied on packets when they get on transmission medium and when
they reach on the destination, a decryption mechanism is applied. This mechanism prevent from
sniffing. Since a packet sniffer gets access to packets at that time when they are transported on
the medium. If they are already encrypted, then no information is gained, if they are not
encrypted then packet’s content can be easily accessed.
8.2. End-to-end encryption
Packets are transmitted among hosts. In end to end encryption each packets are encrypted by the
host that transmit the data and they are decrypted by the host when they are received at the other
end.
12. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
32
8.3. Application level encryption
The application layer enables the user, whether human or software to access the network. It
provides user interfaces and support for services such as electronic mail, remote file access and
transfer, shared database management and other type of distributed information services. So we
see that, at this layer packets contain sensitive material. So an encryption mechanism should be
applied at application level.
Besides it we can protect ourselves/our packets through:
8.4. SSL
SSL is nothing, it is secure socket layer that is used to encrypt packet. So that we can be able to
get secure channel for database communication or simple mail transfer protocol. We can use
something call SSL over http in electronic commerce and E-mail that is “HTTPS” [10].
8.5. TLS
TLS is nothing, it is transport layer security. It is based on SSL. Here a requirement arises that
TLS use the certificates which now a day’s called web based certificates [10].
8.6. IP Security Protocol
It works in network layer of OSI model. Its work is to encrypt all send packets [10]. We may be
able to summarize all these activities by showing the following diagram between two processes:
Secure Channel
Figure 8: Security process
9. CONCLUSION
This paper proposes an approach to detect packets through packet sniffing. It includes some
negative aspects but besides these negative aspects it is much useful in sniffing of packets. Packet
sniffer is not only used for hacking purpose but also it is used for network traffic analysis,
packet/traffic monitoring, troubleshooting and other useful purposes. Packet sniffer is designed
for capturing packets and a packet can contain clear text passwords, user names or other sensitive
material. Sniffing is possible on both non switched and switched networks. We can use some
tools to capture network traffic that are further used by researchers.
We can conclude that packet sniffers can be used in intrusion detection. There exist some
tools also that can be used for intrusion detection. Thus we can say that packet sniffing is a
Process 1 Process 2
Enemy Cryptog
raphy
13. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013
33
technique through which we can create an intrusion and through which we can detect an
intrusion.
ACKNOWLEDGEMENT
The special thanks goes to our helpful guide Dr. Atul Verma. The guidance and support that he
provided us, helps really in completion of paper. The co-operation is much indeed appreciated.
However, it would have not been possible without the kind support and help of our college. We
would like to extend our sincere thanks to all of them.
We are highly indebted to SRMCEM for their guidance and constant supervision. We
would like to express our gratitude towards our friends for their co-operation and
encouragements.
REFERENCES
[1] EtherealPacketSniffing,Available:netsecurity.about.com/od/readbookreviews/gr/aapro52304.htm.
[2] Pallavi Asrodia, Hemlata Patel, “Network traffic analysis using packet sniffer”, International Journal
of Engineering Research and Application (IJERA), Vol.2, pp. 854-857, Issue 3, May-June 2012.
[3] Ryan Splanger, “Packet sniffing detection with Anti sniff”, University of Wisconsin-Whitewater,
May 2003.
[4] Tom King, “Packet sniffing in a switched environment”, SANS Institute, GESC practical V1.4,
option 1, Aug 4th 2002, updated june/july 2006.
[5] RyanSpangler, “Packetsniffingonlayer2switchedlocalareanetworks”,
PacketwatchResearch:http://www.packetwatch.net, Dec 2003.
[6] Sconvery, “HackingLayer2:FunwithEthernetSwitches”, Blackhat, 2002,
Available:http://www.blackhat.com/ presentations/bh-usa-02/bh-us-02-convery-switches.pdf.
[7] http://www.monkey.org/dufsong/dsniff/.
[8] http://www.fish2.com/cops/overview.html.
[9] http://nongnu.org/tiger/.
[10] http://www.securityteam.com/unixfocus/Detecting sniffers on your network .html.
Authors
Rupam is a B.tech Final year student of Computer Science department, Sri Ram
Swroop Memorial Group of Professional Colleges, affiliated to Uttar Pradesh
Technical University.
Dr. Atul Verma is working as an Assistant Professor in the Dept. of Computer in
SRMGPC. He has completed his graduation from Integral University. He obtained his
Ph.D degree in computer science. He has 6 years of teaching experience.
Ankita Singh is a B.tech Final year student of Computer Science department, Sri
Ram Swroop Memorial Group of Professional Colleges, affiliated to Uttar Pradesh
Technical University.