You are on page 1of 5

Bonfring International Journal of Networking Technologies and Applications, Vol. 6, No.

1, March 2019 6

Preventing the Breach of Sniffers in TCP/IP Layer


Using Nagle's Algorithm
P. Subhaasini, N. Bhuvaneswari, M. Jerald and M. Madhavakirshnan

Abstract--- Normally packet is send through the network, implemented by a variety of software and hardware variants
even though packet is encrypted the path which it travel may with equivalent functions but different computing efficiencies.
cause some damage such as packet missing, time delay, packet To improve the overall computational efficiency, mimic
shuffle. To overcome such issues Nagle's algorithm and computing can reconstruct the corresponding system operation
D'Esopo Pape algorithm are used. Hence this algorithm structure or execution environment in a timely and dynamical
increases the response time of the packet. This will take place manner. The inherent dynamics, heterogeneity, and non-
in the TCP/IP layer which is more reliable. determinism of mimic computing naturally disrupt the
integrity of attack chains that current attack technologies rely
Keywords--- Network, Nagles Algorithm, D'Esopo Pape
on. Thus, mimic computing enables information systems to
Algorithm, Maximum Segment Size.
have inherent active defense capabilities. Mimic security
defense is based on the theory of mimic computing. By
I. INTRODUCTION actively changing the basic elements of the information
system components, it realizes the transition or migration of
A S there is the increasing number of development in the
computer networks, the risk originating from networks is
also increasing. Computer Security Institute survey results
network, platform, environment, software, data and other
structures. In addition, these dynamic changes are made to be
show that cyberspace is currently facing the variety of attacks controllable by the defender to realize a mimic environment.
during the transmission of data from the sender to the For the attacker, the target changes are difficult to observe and
receiver. When the packet is send through the same router for predict, thereby greatly increasing the difficulty and cost of an
many number of times repeatedly it finds very easy for the attack and greatly reducing the system security risk.
attackers to monitor the transmission of the packet and can The mimic defense (MD) framework and ‘dynamic,
easy change the packet order and some times can destroy the heterogeneity, redundancy core mechanism in detail. The
packet from the path. Using algorithm as nagle’s algorithm, basic components of DHR consist of heterogeneous variants, a
D'Esopo pape the packet is secured. By using this method dispatcher, a mimic scheduler and a policy-based arbiter.
packet shuffle, packet damage and packet time delay can be Their research mainly focuses on the evaluation issue of DHR
controlled. Thus the system can effectively prevent the sniffers and analyzes its performance with a theoretical model. In
to attack the packet or to shuffle the packet and this system addition, their results show that MD can significantly increase
provides more security. the difficulty faced by attackers and enhance the security of
cyber systems; an up to teatimes enhancement of security can
II. RELATED WORK be achieved. The mimic defense system formally and analyzed
This security of information transmission in a network is the security effects of redundancy in mimic defense systems
an important research topic of global network security; it is through results from Monte Carlo simulations. Proposed a
also the focus of the entire information security field. Network mimic defense web server with a dynamic heterogeneous
sniffing is currently a major threat to network security. It can redundancy structure to establish the software layer, data
layer, operating system layer and other multilayer mimic
be used to eavesdrop on a user’s data, steal a user’s identity,
defense. The web server can effectively resist many types of
achieve unauthorized access and disguise attackers as
intrusion detection and attacks. After attack implantation, the
legitimate users to obtain confidential data. To prevent such
system structure can be transformed so that the original attack
attacks, much research work has been performed.
will fail. An aware decision-making security architecture with
multiple controllers, which exploits heterogeneity and
III. MIMIC SECURITY DEFENSE
redundancy from different controllers to prevent an attack pro-
For information systems, mimic computing can be actively. The architecture utilizes the heterogeneity and
redundancy of controllers to enable the control plane to
P. Subhaasini, Student, Department of CSE, Sree Sakthi Engineering operate in a dynamic, reliable and unsteady state, which
College, AICTE, Coimbatore, India. E-mail: haasinibabu1997@gmail.com significantly hampers the probing of systems and executing
N. Bhuvaneswari, Student, Department of CSE, Sree Sakthi Engineering
attacks. Designed and implemented a mimic network
College, AICTE, Coimbatore, India. E-mail: bhuvanadhijaa468@gmail.com
M. Jerald, Student, Department of CSE, Sree Sakthi Engineering College, operating system, an active defense architecture based on
AICTE, Coimbatore, India. E-mail: jeraldmjt173@gmail.com mimic security defense to ensure SDN control plane security.
M. Madhavakirshnan, Assistant Professor, Department of CSE, Sree The architecture adopts a heterogeneous redundant network
Sakhi Engineering College, AICTE, Coimbatore, India. operating system, and a mimic plane is added between the
E-mail: mkmathava@gmail.com
DOI:10.9756/BIJNTA.9005 traditional SD data plane and the control plane to implement

ISSN 2320-5377 | © 2019 Bonfring


Bonfring International Journal of Networking Technologies and Applications, Vol. 6, No. 1, March 2019 7

dynamic scheduling .This can effectively reduce the components of the vector represent the changes in the system
probability of successful attack and has good fault tolerance. encryption algorithm, the key and the network inter face
Based on the mimic defense theory and technology. proposed channel. Regarding a traditional encryption system, its
a framework against zero-day attacks. To protect the security encryption algorithm, key and network interface are
of distributed storage systems. presented a storage architecture unchanged during the operation, and (t 1 ) =(t 2 ) = (t l ), that
for mimic defense. This architecture adopts heterogeneous a is, the traditional encryption system is static and deterministic.
multi-random coding defense mechanism to actively and Simultaneously, for two different traditional encryption
dynamically defend against indeterminate attacks. systems, the encryption algorithm may be the same, but the
key will be different, though similar. The mimic encryption
System Architecture
system is dynamic, diverse and random. The descriptions of
The data link layer is between the physical layer and the these characteristics are as follows.
network layer and provides services to the network layer based
on the service provided by the physical layer. The data link Dynamic
layer mimic encryption system is implemented by the CPU The encryption and decryption algorithm of the mimic
and the FPGA reconfigurable device. Data encryption is system is dynamically reconfigurable. After negotiation with
performed by inserting the FPGA encryption card into the PCI the user, it can dynamically partially reconstruct the
slot of each computer. The key management module runs on encryption algorithm and the hash algorithm and then
the CPU and is mainly used for the two communication parties complete the switching between different algorithms.
of a key agreement, initialization parameters, key distribution Additionally, the frame FID is time varying, with 256 as a
and FPGA status information statistics. Through the SPI cycle and changing from 0 to 255 in turn. Simultaneously, the
interface, the CPU passes the parameters and keys to the pseudo-random number generator also produces different
FPGA. These are then parsed by the key management module cyclic states with different seeds. In combination with FID
of the FPGA. The FPGA is mainly used for the scrambling, different algorithms are dynamically selected
implementation of the mimic encryption and decryption from the encryption algorithm pool. Finally, the system key is
modules. The reconfigurability of the FPGA, dynamic constantly changing, and at a given point in time, the value is
implementation of different encryption and decryption different from that at other moments, namely, Key (t1) = Key
algorithms, and pseudo-random calls of these algorithms are (t2) = Key(t l).
used to perform data encryption and decryption. The FPGA
Diverse
can integrate multiple redundant 10G, 1G and 100M Ethernet
network interfaces according to the changes in the network The mimic encryption system consists of a pseudo-
processing load and upper user configuration and dynamic random number generator, an encryption algorithm pool, an
switching of the network port and channel. By fully utilizing HK pool and other different elements, and each element has
the flexibility and scalability of the FPGA, the system several different states. Thus, the whole system has many
confuses attackers and prevents network attacks such as different states. Assuming that the system encryption
network sniffing. algorithm pool is Ec = {ec 1 , ec 2 , ec 3 , . . . , ec n }, the
number of encryption changes is n 2. The system has multiple
Encryption Frame Format redundant network interfaces, according to the user
The basic function of the data link layer is to provide configuration, and can dynamically choose a network interface
transparent and reliable data transmission to users. It is the with different rates and different channels. Assuming that the
physical layer used to transmit the original bit stream system has m network interfaces, the number of combinations
capability enhancement and transform the physical error of encrypted frames sent is n 2 ×m. For the same frame
provided by the physical layer connection into a logically content, since the depth of the HK pool is 256, there are at
error-free data link and is represented to the user as an error- most 256 different keys. Thus, there are 256n 2 types of
free route. A frame is an important component of the data link encrypted cipher texts for the same frame.
layer and includes, for example, synchronization information,
address information, data information, and checksum IV. NETWORK PROCESSING
information To facilitate and effectively encrypt these types of
information and to prevent data leakage, it is necessary to
transform the original frame structure.
Security Analysis
Mimic Security Analysis
If the mimic encryption system is represented by the
symbol, it can be described by a 3-tuple as = {Ec, Key, NI
},where represents the encryption algorithm, Key represents
the key, and NI represents the network interface. The multiple
phases of the system have several different encryption
schemes, and if represented by a state vector(t) = {Ec(t),
Key(t), NI (t)} at a certain time, a finite state set can be used to
represent all the different states of the system. The

ISSN 2320-5377 | © 2019 Bonfring


Bonfring International Journal of Networking Technologies and Applications, Vol. 6, No. 1, March 2019 8

Million number of computers that are connected together There may occur time delay during the transmission of packets
for the purpose of sharing the resources. Sharing of resources from source to destination. The data packets may be missed
is made via wired and wireless. Though the wired during the transmission.
transmission of data ,the chance of data missing is very less.
But when the data is send through the wireless medium the V. NAGLE'S ALGORITHM
chance of data missing is very high. Hence the security Nagle’s algorithm is a means of improving the efficiency
provided to the wireless network must be more than that of the of TCP/IP layer by reducing the number of packets that need
wired network. When the important data is send through the to be sent over the network. If the network is very congested,
wireless network the data must be very secure. the ACK will take a long time. This will result in many small
Data Transmission packets being collected into a MSS which is known as
Data transmission is the process of transmitting the data container, thus reducing the overhead. If the network is not in
through one or more computing network. The transmission of congested state, the ACK will arrive very quickly, allowing the
packet is enabled by point to point, point to multipoint, next small segment to be sent without much delay. The Nagle
multipoint to multipoint. There are two process of data algorithm favors the sending of short segments on a “fast
transmission they are parallel and serial processing. Serial network”. Push key is mainly used to indicate that the
processing is fore there divided into two they are synchronous container is to be sent to the receiver even if the MSS is not
and asynchronous. full. The packet that is filled in the MSS can be of any size,
when the MSS is filled immediately the container is send to
the receiver. If the MSS is not filled then the container is kept
in the buffer till it get filled. If the packet that is filled in the
container of different address it can be managed by using the
field ID that is proved in front of the packet. Hence it finds
easy for the different address packets to reach in the different
destination with the help of the container concept in Nagles
algorithm. After the collection of packets the container will be
Synchronous consider as a packet hence the source and the destination
Data is transmitted between the sender and the receiver address will be provided there for the acknowledge purpose.
with the help of time slot which is generated and they have a
1) Nagle's Algorithm
even interval. Synchronous uses the parallel communication.
if there is new data to send
Data is transmitted as a block at one time. The distance overed
if the packet >= MSS and available data is >=
by it is fast. It transmit the When the time is gone out the
MSS
packet that is sent will be rejected and hence the packet must
send complete MSS segment now
be send again and when the acknowledge is also received
else
lately the packet is resend. Due to this purpose the packet that
if there is unconfirmed data still in the pipe en
is missed can be easily identified. Both the sender and receiver
queue data in the buffer until an acknowledge
are synchronized with each other when the clock is set
is arrived
correctly.
else
Asynchronous send data immediately end if
Data is transmitted between the sender and the receiver by end if
its own way thus it has the uneven interval between them end if
when the packet is send. It is also called as the stop or start Normally when the packet is sent from the source to the
transmission. Asynchronous uses the serial communication. destination , each packet gives the response this takes the long
Data is transmitted as a single character at a time. The distance time for the transmission of the packet. If the many number of
covered by it is slow. By using this method the missing packet is sent to the destination the acknowledge is not in the
packets cannot be dected, because it does not have any time proper manner. Hence to over come such issues the nagles
slot to manage the transmission of packet. There can be gaps algorithm is used in the better way. It sends only a single
between the data. container so hence only one acknowledge will be received.
Previous analyses of problems with the data transmission This provides the sufficient information about the packet. The
Pseudo-random selection of combinations of encryption data that is kept in the buffer it waits for 30 sec after that the
algorithms and keys is performed to achieve “One frame –One packet is sent to the receiver.
key” which is the mimic encryption concept. The use of a n
FPGA combine with CPU, software and hardware VI. D'ESOPO PAPE ALGORITHM
collaboration is achieved for the entire system. This makes the The D’Esopo pape algorithm is mainly used to find
attacking surface large which reduces the vulnerabilities of shortest path and to reduce the time taken to find search. It’s a
such attacks. The system can prevent exhaustive key search type of path-finding algorithm. .It work much faster than
attacks, and cipher text only attacks. Security is provided only Dijkstra’s and Bellman-Ford algorithm. The major
for the data link layer. TCP/IP layer security is needed to disadvantage of the Routing Information Protocol, Dijkstra’s
expand the attack surface so that it provides more security.

ISSN 2320-5377 | © 2019 Bonfring


Bonfring International Journal of Networking Technologies and Applications, Vol. 6, No. 1, March 2019 9

algorithm is the fact that it does a blind search there by networks with heavy traffic can be developed by using
consuming a lot of time waste of necessary resources. Another QualNet Developer (‘QualNet’)is a distributed and parallel
disadvantage is that it cannot handle negative edges. Routing network simulator. Variety of machines and operating systems
Information Protocol checks with its neighboring routers every can be maintained with the help of QualNet.
30 seconds, which increases network traffic. To overcome this
D’Esopo pape algorithm is used. By using the distance and
time balancing to avoid the blind search which reduces the
time waste which also work with the negative edges. Due to
parallel processing for searching the node , the time reduced.
• Bellman-Ford algorithm is mainly used to find the
shortest path only when the graph is weighted.
• Dijkstra's algorithm is similar to that of the Bellman-
Ford algorithm but the Dijkstra's algorithm does not
work with the negative edges.
2) D'Esopo pape algorithm
Kershenbaum Algorithm()
Construct a two-vertex graph with vertices 1 and 2, and
edges(1,2) =1;
for k = 3 to n add vertex k; for i= 2 to k =1;
add edge(k.i0 with weight (edge(k,i))=
weight(edge(1,i));
weight (edge(1,i)) = weight (1,i) + 1;
add edge(1,k) with weight (edge(1,k)) =1;
With the help of the above algorithm the shortest path can Network Simulator Techniques
be easily found out, and also the negative edges. It does not There are three widely used techniques for running the
check any blind search like other algorithm. Here the vertices Network simulator they are as follows,
represents the router and weight represents the distance
• Parallel
between the sender and the router.
• Distributed
VII. NETWORK SIMULATION • Combination of both Parallel and the Distributed.
Stochastic or discrete-event simulation is a part of parallel
It shows the simulation for routing and multicast protocols and distributed simulator. Stochastic simulation is regarded as
for either wired and wireless network in the internet. Network a statistical experiment where the data is analyzed using some
simulation is an correct imitation of the o a process or system statistical method for that purpose. Time based behavior of a
operation. It has successfully applied to many application. It system can be monitor by the distributed simulator. Due to
is used to explore changes and alternatives in a very low risk limited performance of the current network simulators it have
environment which is very safe than the other operation. most widely performed on small network models and for short
Behavior, functions and abstract are the key characteristics time scales. Several simulations that are running on multiple
that are used to represents the simulator. Real- world problems inter- connected processors correctly are termed as Parallel
are solved safely and efficiently with the help of the network simulation. Huge amount of memory and processing time are
simulation. There are five types of the network simulation required for the simulation of large networks. Rerunning
they are Task Trainer Simulation. multiple replications in parallel number of machines are
• Manikin-based Simulation. suggested to reduce the time duration of simulation.
• Standardized Patient Simulation. • Practical feedback is given when designing real
• Virtual Reality Simulation. world systems.
• Tissue-based Simulation. • Correctness and efficiency of a design is determined
The goals of the study is the initial step which involves before the system is actually constructed.
defining what needs to be solved. The Monte Carlo method • Limited external regulation is provided.
uses the random numbers which is the simulation technique. The packet that is sent, need to reach the destination.
The principles of Student-Centred and constructivist learning When the packet is send continuously the information about
and teaching is a strategy for the simulator which takes the the packet cannot be obtain. To overcome this acknowledge
number of forms. It is the form of experiential learning. concept is introduced. Here when the packet is send to the
Forecast the future behavior of a system by using the receiver, immediately when the packet reaches the receiver
simulation which influence that future behavior. Selecting an acknowledge about that packet is send to the receiver. Hence
appropriate network simulator for a particular application, it is when the packet is missed during the transmission the same
important to have knowledge of the simulator tools available, packet can be resend to the receiver. Path works similarly to
along with their strengths and weaknesses. General purpose traditional uptime and performance monitoring solutions by
network simulator is Optimized Network Engineering Tool creating a network
which is a discrete event, object-oriented. Simulation of large

ISSN 2320-5377 | © 2019 Bonfring


Bonfring International Journal of Networking Technologies and Applications, Vol. 6, No. 1, March 2019 10

a) Consisting of monitoring nodes around the world. the important information as IP address, port number etc,
However, unlike traditional networks, the nodes used which provides thee opportunity for the attackers breach the
to the system. data. Normally packet is send through the network, even
b) Monitor and collect information are made up of though packet is encrypted the path which it travel may cause
distributed, independent applications located at the end some damage such as packet missing, time delay, packet
user shuffle. To overcome such issues Nagle's algorithm and
c) Level rather than the data center level. This allows for a D'Esopo Pape algorithm are used. Hence this algorithm
wider variety of data gathering points with built in increases the response time of the packet. This will take place
redundancy, end-to-end visibility, and an in the TCP/IP layer which is more reliable. To speed up the
unprecedented number of locations around the world. packet transmission some other efficient algorithms can be
1. An unprecedented number of independent data implemented in the Transport layer. So that more number of
collection points. packets can be sent simultaneously from the sender to the
2. Operators can run the node application from anywhere receiver. Some more additional formulas and the mathematical
in the world on any internet connected device. problems can be used to calculate the packet speed when it is
3. bringing massive global efficiency to deficiencies in transmitted from the sender.
local monitoring coverage not currently addressed by
any REFERENCES
4. Network monitoring service providers. [1] Z. Trabelsi, “Enhancing the comprehension of network sniffing attack
All monitoring nodes are end user level and independent. information security education using a hands-on lab approach”, In
Our advanced network analytics / telemetry results from data Proc.15th Annu. Conf. Inf. Technol. Educ., Pp. 39–44, 2014.
[2] X. Li, “On modeling eavesdropping attacks in wireless networks”, J.
collected on standard workstations, IOT systems and mobile Comput. Sci., Vol. 11, Pp. 196–204, 2015.
devices, providing a level of network analysis in sight [3] E. Al-Shaer, W. Marrero, A. El-Atawy and K. ElBadawi, “Network con
previously thought unobtainable figuration in a box: Towards end-to-end verification of network
reachability and Security”, In Proc. IEEE Netw. Protocols, Pp. 123–132,
Modules processing 2009.
[4] A. Nguyen-Tuong, D. Evans, J. C. Knight, B. Cox and J. W. Davidson,
Normally the packet is send from the sender to the “Security through redundant data diversity”, In Proc. IEEE Dependable
receiver, which gives the acknowledgement to the receiver. Syst. Netw. FTCS DCC, Pp. 187–196, 2008.
Due to this the packet is send in the safe manner thus if the
packet is missed that particular packet can be resend again.
Not only the single user is send to the receiver. The sender can
by many numbers that is many number of users. When
multiple sender sends the data to the receiver the place may be
in a congestion form. Hence to over come this the
acknowledge can be taken place in the First In First Out order.
Due to this order the packet can be sent easily from the sender
to the receiver. Using the Nagles algorithm the container
concept is used, so that packet is sent very safely from the
sender to the receiver. The size of the container is 14GB so
that more number of packets can be sent at a starch for the
transmission purpose.
Nagle’s algorithm is a means of improving the efficiency
of TCP/IP networks by reducing the number of packets that
need to be sent over the network. If the network is very
bogged down, the ACK will take a long time. This will result
in many small packets being collected into MSS, thus
reducing the overhead. If the network isn’t bogged down, the
ACK will arrive very rapidly, allowing the next small segment
to be sent without much delay. The Nagle algorithm favors the
sending of short segments on a “fast network” and favors
collecting them into larger segments on a “slow network”.
Push keyword is mainly used to indicate that the packet is to
be sent to the receiver even if the MSS is not full.

VIII. CONCLUSION
With the increasing development of the internet more
attention has to be paid to the network security problems.
Network security defense technology has a very important
scope in the research field. Now a days network equipment
transmit data in the plaintext at the data link layer, which has

ISSN 2320-5377 | © 2019 Bonfring

You might also like