Experiment Number 4
Experiment Number 4
Aim: Detecting Suspicious Activity: Analyze network traffic to identify suspicious patterns, such as
repeated connection attempts or unusual communication between hosts.
Descriotion: Detecting Suspicious Patterns:
1. ldentification of suspicious traffic patterns: The first thing we must do is analyze network traffic to
identify patterns that may indicate the presence of an attack. Some of these patterns may be:
2. Wireshark packet analysis: Once these patterns are identified, it's time to analyze the packets in
Wireshark to learn more about suspicious traffic. Some of the techniques we can use are:
3. Decision making: Once we have identified the suspicious traffic and have analyzed the packets in
Wireshark, it is time to make decisions. Some of the actions that we can carry out are:
Here are some filters that we can use in Wireshark to detect intrusions and malware attacks:
This filter allows us to detect fake ARP packets, which are commonly used in man-in-the-middle attacks.
By using this filter, Wireshark will only show us the ARP packets that have our IP address as destination.
Ping flood attacks consist of sending a large number of ICMP Echo Request (ping) packets to a specific
IP address, causing a network overload. With this filter, we can quickly detect these types of attacks.
3. Filter to detect SYN flood packets:
tcp.flags.syn ==1 && tcp.flags.ack == 0
SYN flood attacks consist of sending a large number of TCP SYN packets to a server, causing a
connection overload. With this filter, we can detect packets that have the SYN flag set and the ACK flag
set.
XSS attacks consist of injecting malicious code into a web page, which allows the attacker to steal user
information. With this filter, we can detect HTTP requests that include HTML code.
When analyzing network traffic, keep an eagle eye out for the following red flags:
1. Repeated Connection Attempts:
o Frequent connection requests from the same source to different ports or services can be
suspicious.
o Look for patterns like rapid retries or brute-force attacks.
2. Unusual Communication Behavior:
o Sudden spikes in traffic volume or unusual timing patterns may indicate malicious activity.
o Monitor for unexpected peaks during off-hours.
4. Protocol Anomalies:
Wireshark: As we discussed earlier, Wireshark is your trusty sidekick for capturing and dissecting
packets.
Snort: An open-source intrusion detection system (|DS) that detects and alerts on suspicious
network traffic.
Bro/Zeek: A powerful network analysis framework for real-time monitoring arnd analysis.