1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm, Shukor Abd Razak Faculty of Computing, University Technology of Malaysia Abstract Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. Computer networks have kept up growing in size, complexity and, overall, in the number of its users as well as being in a permanent evolution. Hence, Packet sniffers are useful for analyzing network traffic over wired or wireless networks. In this paper, security network protocol analyzer, wireshark, has been used to capture the data from Center of Information and Communication Technology (CICT) network traffic in Universiti Teknologi Malaysia. These data can be applied as a sample to test it by wireshark. Indeed, the data packets have obtained are malware and non-malware. The aim of this paper is to analyze these data in order to help network administrator to monitor any abnormal behavior in the network and log it. The information gathered from CICT and the data analyzed using matching algorithm. The results gave high implication in the analysis of network and increase significant essence in network security to detect any threats that violate system security. Keywords: Matching Algorithm Network Security; Wireshark;. 1. Introduction Packet Sniffing is a technique for monitoring every packet that crosses the network. A packet sniffer is the best open source software available that monitors network traffic. The security threat presented by sniffers is their ability to capture all incoming and outgoing traffic, including clear text passwords and usernames or other sensitive material. Sniffer is a program running in a network attached device that passively receives all data link layer frames passing through the device's network adapter. It is also known as network or protocol analyzer or Ethernet Sniffer. The packet sniffer captures the data that is addressed to other machines, saving it for later analysis. It can be used legitimately by a network or system administrator to monitor and troubleshoot network traffic either in local area network or in host system [1]. In this paper, security network protocol analyzer wireshark has been used to capture the data from CICT network traffic. These data can be applied as a sample to test it by wireshark. Indeed, the data packets have obtained are malware and non-malware. *Corresponding author: almaldolah2012@gmail.com IRICT 2014 Proceeding 12 th -14 th September, 2014, Universiti Teknologi Malaysia, Johor, Malaysia
Abdulalem Ali et. al. /IRICT (2014) 508-515 509 The aim of this study is to analyze these data in order to help network administrator to monitor any abnormal behavior in the network and log it. The information gathered from CICT and the data were analyzed using open source tools. The rest of this paper is structured as follows. Section 2 presents tools for traffic analysis. Priciple of network sniffer in section 3. In Section 4, implementation of network sniffer. Methodology in section 5. In Section 6, The results. Finally, the conclusion is presented in Section 7. 2. Tools For Traffic Analysis Wireshark Previously known as Ethereal, Wireshark, as it is currently known, is a packet analyzer employed in analyzing troubleshooting of networks. The change of name was done in May, 2006 because of a trademark issue. Wireshark captures packets by means of PCAP. It is a cross-platform which is capable of running in various types of operating system that are Unix-like as well as Windows and Solaris. In Wireshark, it is not only the traffic meant for an address constructed for the particular interface that can be seen, but rather everyone is visible there [2]. This is possible because the user can make use of an interface allowing a loose mode. Figure.1: Wireshark tool. Wireshark makes it possible for the user to capture packets moving across the whole network on a given interface per time. The capture tool is one of the basic tools. The user is able to carry out the packet, and capture using the capturing menu which has a number of options to choose from based on the analysis desire. It is also possible for the analyst to set filters such that unwanted traffic that can be avoided during the capture [3]. Wireshark however, has a limitation in that it does not possess intrusion detection capability. The user gets no warning when an intruder tampers with something on the network and wireshark does not exercise control over the network. Space consumption is quite much with its 18MB file installation taking up to 81MB and 449MB respectively in Windows and Linux [4]. However, the Wireshark GUI is quite user friendly.
Abdulalem Ali et. al. /IRICT (2014) 508-515 510 Soft Perfect Network Protocol Analyzer (SPNPA) This is an advanced, professional analyzer. It analyzes data passing through the dial-up connection or the Ethernet card and presents it in comprehensible form. It is a practical tool for different network personnel or any user requiring a broad picture of personal network traffic. SPNPA results are very easy to understand and also allows for defrayments of network packets and reassembling into streams. CAPSA This is an indispensable tool for network administrators. It is a freeware, designed for personal use or small business and useful for network monitoring, diagnosis and troubleshooting. Packet capturing is real-time, forensics is reliable, monitoring is on 24/7 basis, protocol analysis is advanced and packet decoding is in-depth. 3. Principle of Network Sniffer Network sniffer uses the local media; the transforming data can be detected by any computer system. Data frame is received by each computer s Ethernet network adapter, generating either a data frame that is a match of its own hardware address or a broadcast frame. With the two data frame type, for Ethernet network adapter, the data are transformed into upper processing, whereas it discards the other types of frames. In promiscuous mode, the adapter can accept data transmission in every segment and transfer same to the OS for further treatment. Data transformed within the sharing network can be detected in network sniffer as shown in Figure 2[5]. Figure.2: Implementation of Network Sniffer 4. Implementation Of Network Sniffer For the completion of network data collection, setting of network detector are done in the physical segment and linked to export routers on the network. This way, detection of all packets in the network is possible. NICO and NICI are the two adapters with which the network detector is configured as a host. While the former serves as the communication interface, the latter is set as the promiscuous mode and linked to the router at the same hub shown Figure 3.
Abdulalem Ali et. al. /IRICT (2014) 508-515 511 Figure.3: Model of the Network Sniffing. Packer Sniffer A packet sniffer sniffs information passing through a system, and stores/presents the content of the fields in this message. It is the tool for monitoring communication between protocol entities. It is a passive tool; only observing communication without being responsible for initiating it; packets received are also not directly addressed to it, it only receives copies The typical packet sniffer set-up is shown in Figure 4 The protocols (IP) and applications are on the right. The sniffer is represented by the rectangular broken line. It is a mere addition to the regular computer software. It is made up of the packet capture library and the packet analyzer. The packet capture library receives a copy of information (link-layer frame) transmitted over the computer; encapsulation of information through higher layer protocols, e.g. DNS, HTTP, etc is done in link layer frames transmitted through physical media.. Figure 4. Packet Sniffer Structure The packet analyzer is the other component of the sniffer. It is responsible for displaying the contents of all fields in a protocol communication. To be able to do this, it must have an understanding of the structure of protocol communication. For example, if we intend to display the component fields of the communication on the HTTP protocol. The packet analyzer can identify the IP datagram format by comprehending the Ethernet frame format. It is also able to extract the TCP within the datagram. It is also able to comprehend HTTP protocol and will be able to identify the content of the first bytes of an HTTP message
Abdulalem Ali et. al. /IRICT (2014) 508-515 512 5. Methodology Data of computer send through the network in the form of packets. These packets are the group of data is actually directed to the certain designated system. In reality, most of data sent through the network which need to predefine it before send it to the destination and all the data are going directly to a particular computer. There are many examples of packet sniffing software available on the internet for free that can be run on different platforms including windows and Linux. In our experiment, wireshark network analyzer is the one that will use to sniff network traffic in CICT department. These data traffic will be examined and compared with one pattern or signature form in order to find any abnormal pattern in these data. Actually, two kinds of data have been getting, one malware and the other one nonmalware. So we are going to test these data using one software tool to analyze it. A. Sniffing Process Here we are going to talk in a brief about sniffing process and our analysis implemented by wireshark software. The following steps describe sniffing process base on [6]: Packet sniffer collects raw binary data from the wire. Typically, this is done by switching the selected network interface into promiscuous mode Captured binary data is converted into a readable form. Analysis of the captured and converted data. The packet sniffer takes the captured network data, verifies its protocol based on the information extracted, and begins its analysis of these protocols for specific features. 6. Results The data packets were obtained from CICT department. These data packets were already captured from the network by wireshark. The data can be classified into two type malware and non-malware. When the data packet was compared with signature used one software tool implemented via matching algorithm to give us analysis parameters. This software can be used to compare the payload data for the selected protocol with a particular pattern as shown in the Figure 5. In our experiment, we used TCP payload string and compared with the small size of the pattern. In each time we compared around five packets with a specific pattern or signature in one trial. Figure.5: Packet Comparison Software Implemented by Matching Algorithm
Abdulalem Ali et. al. /IRICT (2014) 508-515 513 In the above Figure 5, there are two input places, the first one is a load pattern input where you can type the specific signature pattern inside and in the second place for input is load string, this place can insert one or more packets to compare with pattern. After we insert the two inputs together, we press quick search algorithm button to get the following parameters from the software. First Testing using Malware Data Packets: We have two types of data packets which obtained from CICT organization, so that our experiment will be implemented in two stages. The first test is dealing with malware packet. Table 1 shows malware packages comparisons. Table 1. Number of Comparison Packets using Matching Algorithm No. Comparison Total Search Time No. Comparison Total Search Time I 537 0.047 608 0.034 n 606 0.047 343 0.0411 f a 236 0.031 265 0.011 In the above table, the data packets were tested three times, in the first comparison, we used five packets for TCP protocol to compare with signature (specific pattern). We observed that the number of comparisons is 537 and the time consuming is 0.047. In the second comparison, we used six data packets so that we observed that the number of comparisons is increased but the time still stable. In the third comparison, we decrease the data packet into four therefore we found the number of comparisons decreased also and the time for total search was decreased. 1500 1000 500 0 Malware Testing Packet 606 236 537 0.031 0.047 0.047 265 343 608 Series3 0.011 Series2 0.0411 0.034 Series1 No. Total Search No. Total Search Comparison Time Comparison Time Figure.6: Malware Testing Payload using Matching Algorithm We have observed that, from Figure 6, the graph starting point always from the total search time. The first line, the red line, indicates that the maximum number of comparisons reaches more than 1000 and the second line is the blue line reaches less
Abdulalem Ali et. al. /IRICT (2014) 508-515 514 than 600. The minimum number of comparisons was represented by the green line which indicates the lowest number, 236.the Second Testing using Non-Malware Data Packets: The second test in our experiments was non malware data packets in order to compare with specific pattern. Table 2 shows the non-malware packages comparisons using match algorithm. Table 2. Non-Malware packages Comparisons using Match Algorithm No. Comparison Total Search Time No. Comparison Total Search Time 343 0.031 963.0359 780 0.047 1046 0.0391 870 0.063 1160 0.0453 In the first comparison, we used five data packets, then in the second comparison we used six packets in one times, and in the third comparison we used four packets in order to compare with specific pattern. 4000 2000 0 Non-Malware Testing Packet 8700.063 780 3430.047 0.031 1160 1046 0.0453 9630.0391 0.0359 Series3 Series2 Series1 Figure 7. Non-Malware Packages Testing using Matching Algorithm Figure 7 shows three lines, the green line indicates the maximum number of comparisons and consuming time was about 0.0453. Then, it was followed by the red line that represented the second highest number after green line and consumed time for total search around 0.0391. The third line was the blue line that indicated the lowest number of comparisons and lowest time consumed. We observed that the highest point was 1160 and the lowest point was 343.
Abdulalem Ali et. al. /IRICT (2014) 508-515 515 7. Conclusion One of the significant methods in network security nowadays is to use the network traffic analyzer in order to reveal any abnormal behaviour in the data transfer over the network. Network analyzer tools can be used to monitor and troubleshoot the network. Network administrator do not only use these tools to fix any violation in network system but also to avoid network failure and detect security vulnerabilities. Network sniffer is one of the passive attacks that can sniff the traffic and analyze it. Unlike network sniffing, it is a sniffer detector tools that can discover any sniffing attack through the network and prevent it. Sniffing network traffic is an illegitimate process unless if it used for security purpose. Two types of data analysis have been tested for packets malware and no-malware. Comparisons between packets have been made that uses different techniques depending on what administrator wants. The results showed that while we used the small size of patterns to compare within a group of packets for more than five packets, it will give us more satisfied results and the make network analysis more efficient. References [1] Ansari, S., Rajeev S.G., Chandrasekhar H.S., "Packet Sniffing: A Brief Introduction", IEEE Potentials, Jan. 2003, Volume: 21 Issue: 5, pp: 17-19 (2003). [2] Dabir, A., Matrawy, A. "Bottleneck Analysis of Traffic Monitoring Using Wireshark", 4 th International Conference on Innovations in Information Technology, 2007, IEEE Innovations '07, 18-20 Nov. (2007), Page(s): 158-162(2007). [3] Dulal C., et al.. Ethereal vs. tcpdump: A comparative study on packet sniffing tools for educational purpose. Journal of Computing Sciences in Colleges archive, Volume 20(4), pp 169-176, (2005 [4] All about Wireshark [Online] Available http://www.wireshark.org/. [5] Lida, Z., Jiguang, L. "The Analysis of Technology in Detection and Undetection with Network Sniffer ", Journal of Zhongnan University for Nationalities,NO.9.2003.(in Chinese) [6] BoYu "Based on the network sniffer implement network monitoring. International Conference on Computer Application and System Modeling (ICCASM 2010)Volume: 7,2010, Page(s): V7-1-V7-3(2010). IEEE