Thursday, April 14, 2022

Abstract

This paper introduces the full implementation of software for the Packet sniffer desktop application that captures network data. The purpose of the network sniffer is to rewrite the C sniffer in Java and also to develop an application that consumes less memory on the hard disk. This function indicates the necessary requirement for designing a new application; developed in Java and consumes less memory on the hard disk. This application contains three modules that handle different tasks. This program can monitor network traffic, and analyze traffic patterns. This application does not transfer any data to the network, it has a friendly GUI and is very easy to install.


Introduction

When any data is to be transferred to a computer network, it is divided into units in the sender area called the data packets and reassembled in the recipient space in its original format. A small computer network communication unit. The action of capturing data packets is called the sniffed packet.

Sniffer is a program that listens to network traffic by capturing network information. They work because Ethernet is built around a shared system. Most networks use broadcast technology when one computer message is read by another computer in that network. In fact, all computers other than the targeted message will ignore that message. However, computers can be programmed to receive messages even if they are not intended for them. This is done by sniffing. By using a sniffer, the attacker can capture packets like DNS traffic, web traffic, email, and other types of data traffic. By downloading these packets, the attacker may disclose information such as data, username, and passwords from agreements such as HTTP, SMTP, IMAP, POP, FTP, and Telnet. The sniffing process is done using loose holes. This paper covers the function of the inhalation package, the odor-detected agreements, the tools used for inhalation, the defense strategies against odor attack, and the detection strategies.


Why the use of Network Sniffer

 Network information is an important source of evidence for network administrators to intruders or in strange connections. The need to capture this information has led to the development of packages for network sniffers.

This monster will come with additional functionality such as 3D pie charts, GUI, and small memory requirements.

This hacker will help monitor network traffic and keep a record of all communications on the network, and then analyze it to detect suspicious activity.


About the Project

The purpose of this project is to develop a Network Packet Sniffer. It is software that monitors all network traffic. As data streams flow across the network, the sniffer captures the packets and eventually decodes and analyzes their content. For network monitoring purposes it may also be desirable to monitor all data packets in a LAN and to mirror all packets passing through a shared bus.

This project will consist of three modules: 1. User Interface module 2. Statistics module and  3. Packet Analysis module. The User Interface module provides all the Graphical Interface components which are used for users to interact with the system. The Analysis Module will analyze the incoming packets into a computer, identify them, and pass the information into the Statistics module. Finally, the statistics module does the necessary calculation based on the information and produces information that can be understood by the user. [1]

This system is thus very useful to the users and a network administrator in particular who is generally responsible for monitoring things on a network.

The program is a network analyzer (also known as protocol analyzer & packet sniffer), that performs real-time packet scanning, 24x7 network monitoring, advanced protocol analysis, in-depth packet recording, and automatic expert diagnostics. Allows you to get a clear idea of ​​a complex network, analyze package quality, and solve network problems.

This program is useful for a network manager who needs to identify, diagnose, and resolve network problems, a company manager who wants to monitor users' activities on the network and ensure that the organization's communication assets are secure, or an advisor who should resolve them promptly. network problems for customers.  

Existing System

As a network manager who needs to identify and resolve network problems, a company manager who wants to monitor users' activities on the network and ensure that the organization's communication assets are secure, or a consultant who should immediately resolve network problems for customers. It is difficult to diagnose problems if network traffic is not tracked, as the administrator generally relies on an analyst provided by the operating system (if any) or anti-virus software installed to provide real-time network security. . However, it is recognized that these programs provide a specific set of reports that may be sufficient for the administrator to track all issues. To handle these types of problems we want to use a specific network analyst that can track all incoming and outgoing calls.

The Conversations tab allows us to monitor network traffic for each chat and determine which chat has generated the largest network traffic.

Disadvantages of Existing System:

· Administrators need a lot of effort to see traffic

· The process is very time-consuming.

· No automatic network control.


Output


Capture Network Package with Java

Jpcap is a collection of Java classes that provide an interface and application to download the network package. Tracking library and virtual network tools included .jpcap hides low data packet capture details by releasing multiple types of network packets and protocols in Java studies. Internally, jpcap uses binding to the libpcap system library via JNI (Java Native Interface). Jpcap uses libpcap, a widely shared library of downloads at user level. libpcap must be installed on your system in order to use jpcap. Jpcap has a small shared library that includes libpcap and a collection of Java classes. The shared library section provides event hints, connectivity, and data conversion within Java VM using libpcap. The 'download' package contains a basic scanning program. The 'net' package contains the output of several types of network packets and protocols. The 'template' package contains a network template. Jpcap is licensed under the Mozilla public license.


Proposed System

As a network analyst (like packet sniffer), this system makes it easy for us to monitor and analyze network traffic with its accurate tab views and rich information. With this network monitoring feature, we can quickly identify network barriers and detect network abnormalities. This article discusses how to monitor network traffic with this feature of network traffic monitoring.

This program provides an overview that provides general information about the entire network or selected location in the browser. In Summary View, we can get a quick overview of traffic content, real-time traffic, streaming traffic, multi-stream traffic, and more. If we switch between nodes from the tester, the corresponding traffic information will be provided.

In the Endpoints view; we can monitor network traffic information of each node, both local and remote. With its easy sorting feature we can easily find out which host is generating or has generated the largest traffic.

The Protocols view will list all protocols applied in network transmission. In the Protocols view, we can monitor network traffic by each protocol. By analyzing network traffic by protocol, we can understand what applications are using the network bandwidth, for example, the "HTTP" protocol stands for website browsing, "pop3" stands for email, etc.

ADVANTAGES OF PROPOSED SYSTEM

· Network Admin can monitor the packets anywhere.

· Traffic can be controlled.

· System performance will be increased.

· Graphical data is available for analyzing the network.


Conclusion and Future Work

This is the main driving force for this project to provide a highly recommended tool that can be used by people just to monitor their home network of tasks included in the process. Many are unusual if you do not have network monitoring technology with tools like Wireshark and TCP dump.

Potential future activities that can be undertaken in the project:

1. Live View (e.g. without creating a script) results in an animated GUI that completely cuts user access to the backend and completely cuts back user access.

2. Visual filtering provided in relation to domain names.

3. Notice of Access to Suspicious Websites.

4. Sorting function on the basis of each session.

5. Availability of the Windows App because it fits well in the market. a network-based intrusion detection system (NIDS) detects malicious traffic on a network. NIDS usually requires promiscuous network access in order to analyze all traffic, including all unicast traffic. NIDS are passive devices that do not interfere with the traffic they monitor.

Technical Documents

GitHub: https://github.com/dhruvigediya/20it029-20it035-sgp

Technical Paper: https://drive.google.com/file/d/1Q9IAkh-N4ZgF-ev_mTAnVYW6v5JMXPwO/view?usp=sharing