An intelligent approach of sniffer detection

نویسندگان

  • Abdul Nasir Khan
  • Kalim Qureshi
  • Sumair Khan
چکیده

ARP cache poisoning and putting host Network Interface Card (NIC) in promiscuous mode are ways of sniffer attacks. ARP cache poisoning attack is effective in an environment which is not broadcast in nature (like switch LAN environment) and other attack is effective in an environment which is broadcast in nature (like hub, bus, access point LAN environments). Sniffing is malicious activity performed by network user and because of this network security is at risk so detection of sniffer is essential task to maintain network security. Sniffer detection techniques can be divided into two main categories. First category’s techniques are used to detect a sniffer host that runs it’s NIC into promiscuous mode and second category’s techniques are used to detect a sniffer host that uses ARP cache poisoning for sniffing. The network configuration is hidden form users. Network users do not have any information about nature of network. Therefore, users of network may invoke such sniffer detection technique that is not effective in that environment. This may result in sharing of his private and confidential information with malicious users. In this paper, we designed an intelligent invocation module that checks the nature of environment automatically and invokes appropriate, sniffer detection technique for that environment. With the help of this invocation module it is possible to detect passive as well as active sniffer hosts in both environments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Integrated Approach to Oil Production Optimization and Limiting the Water Cut Using Intelligent Well Concept: Using Case Studies

Intelligent well technology has provided facility for real time production control through use of subsurface instrumentation. Early detection of water production allows for a prompt remedial action. Effective water control requires the appropriate performance of individual devices in wells on maintaining the equilibrium between water and oil production over the entire field life. However, there...

متن کامل

Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

متن کامل

Design an Intelligent Driver Assistance System Based On Traffic Sign Detection with Persian Context

In recent years due to improvements of technology within automobile industry, design process of advanced driver assistance systems for collision avoidance and traffic management has been investigated in both academics and industrial levels. Detection of traffic signs is an effective method to reach the mentioned aims. In this paper a new intelligent driver assistance system based on traffic...

متن کامل

INTELLIGENT BUILDING ASSESSMENT BASED ON AN INTEGRATED MODEL OF FUZZY ANALYTIC HIERARCHY PROCESS AND FUZZY PREFERENCE DEGREE APPROACH (FAHP-FPDA)

Intelligent building (IB) technologies have widespread applications in the building design and development. In this regard, it is necessary to develop intelligent building assessment models in order to satisfy the clients, professionals, and occupants' growing demands. To this end, this paper proposes an integrated analytic hierarchy process (AHP) and preference degree approach (PDA) under the ...

متن کامل

Designing an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic

One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Int. Arab J. Inf. Technol.

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2012