Bottleneck analysis and traffic congestion avoidance

With the help of software such as packet sniffer one can easily intercept or capture the network packets that travel across the network. The sniffer captures these packets by setting the NIC card in the promiscuous mode and eventually decodes them and they can be used for several fruitful purposes. This paper discusses the different steps for the development of packet sniffer using Linux as a platform. This paper presents a novel approach to the development of a packet sniffer, one which we have employed and added features for packet analysis and intrusion detection. It also lists different steps that can be taken to encounter the malicious use of packet sniffers (e.g. ARP sniffing, SNMP monitoring etc.). Packet sniffer developed by us can be used for network monitoring to prevent bottlenecks when network congestion occurs. The development phase began after studying the behavior of already existing sniffer softwares such as Wire Shark or Ethereal on both Linux and Windows platform. In the development of the packet sniffer a library known as libpcap is used, which is an in built feature of an OS and help us to grab the packets directly from the network card.

[1]  George Varghese,et al.  Network Algorithmics-An Interdisciplinary Approach to Designing Fast Networked Devices , 2004 .

[2]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[3]  Neil Matthew,et al.  Beginning Linux Programming , 1996 .

[4]  Mounir Frikha,et al.  Malicious sniffing systems detection platform , 2004, 2004 International Symposium on Applications and the Internet. Proceedings..

[5]  H. S. Chandrashekar,et al.  Packet sniffing: a brief introduction , 2003 .

[6]  W. Richard Stevens,et al.  Unix network programming , 1990, CCRV.

[7]  H. Hurley computer networking. , 1996, Ostomy/wound management.

[8]  K. Tamine,et al.  Intelligent Agents for Distributed Intrusion Detection System , 2007 .

[9]  Jill Slay,et al.  Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[10]  Wei Guo,et al.  Network monitoring in broadband network , 2001, Proceedings of the Second International Conference on Web Information Systems Engineering.

[11]  Steven McCanne,et al.  The BSD Packet Filter: A New Architecture for User-level Packet Capture , 1993, USENIX Winter.

[12]  A. Matrawy,et al.  Bottleneck Analysis of Traffic Monitoring using Wireshark , 2007, 2007 Innovations in Information Technologies (IIT).

[13]  Charles Hornig A Standard for the Transmission of IP Datagrams over Ethernet Networks , 1984, RFC.

[14]  Ian Graham,et al.  Design principles for accurate passive measurement , 2000 .