An intelligent approach of sniffer detection
نویسندگان
چکیده
ARP cache poisoning and putting host Network Interface Card (NIC) in promiscuous mode are ways of sniffer attacks. ARP cache poisoning attack is effective in an environment which is not broadcast in nature (like switch LAN environment) and other attack is effective in an environment which is broadcast in nature (like hub, bus, access point LAN environments). Sniffing is malicious activity performed by network user and because of this network security is at risk so detection of sniffer is essential task to maintain network security. Sniffer detection techniques can be divided into two main categories. First category’s techniques are used to detect a sniffer host that runs it’s NIC into promiscuous mode and second category’s techniques are used to detect a sniffer host that uses ARP cache poisoning for sniffing. The network configuration is hidden form users. Network users do not have any information about nature of network. Therefore, users of network may invoke such sniffer detection technique that is not effective in that environment. This may result in sharing of his private and confidential information with malicious users. In this paper, we designed an intelligent invocation module that checks the nature of environment automatically and invokes appropriate, sniffer detection technique for that environment. With the help of this invocation module it is possible to detect passive as well as active sniffer hosts in both environments.
منابع مشابه
A Novel Integrated Approach to Oil Production Optimization and Limiting the Water Cut Using Intelligent Well Concept: Using Case Studies
Intelligent well technology has provided facility for real time production control through use of subsurface instrumentation. Early detection of water production allows for a prompt remedial action. Effective water control requires the appropriate performance of individual devices in wells on maintaining the equilibrium between water and oil production over the entire field life. However, there...
متن کاملIntelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms
Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...
متن کاملDesign an Intelligent Driver Assistance System Based On Traffic Sign Detection with Persian Context
In recent years due to improvements of technology within automobile industry, design process of advanced driver assistance systems for collision avoidance and traffic management has been investigated in both academics and industrial levels. Detection of traffic signs is an effective method to reach the mentioned aims. In this paper a new intelligent driver assistance system based on traffic...
متن کاملINTELLIGENT BUILDING ASSESSMENT BASED ON AN INTEGRATED MODEL OF FUZZY ANALYTIC HIERARCHY PROCESS AND FUZZY PREFERENCE DEGREE APPROACH (FAHP-FPDA)
Intelligent building (IB) technologies have widespread applications in the building design and development. In this regard, it is necessary to develop intelligent building assessment models in order to satisfy the clients, professionals, and occupants' growing demands. To this end, this paper proposes an integrated analytic hierarchy process (AHP) and preference degree approach (PDA) under the ...
متن کاملDesigning an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic
One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Int. Arab J. Inf. Technol.
دوره 9 شماره
صفحات -
تاریخ انتشار 2012