packets, in order to take the RTT measurements. Then, the host is set to the
promiscuous mode. And, the same request packets are sent again to the host, and the
corresponding RTT measurements are collected. The RTT averages, the standard
deviations, and the percentage of changes of the collected RTT measurements are
computed. The RTT averages, standard deviations, percentage of changes are called
the training data.
The samples of the collected RTT measurements represent two different
populations, called the normal mode population and the promiscuous mode
population. To show that the two averages of the samples RTT measurements are
statistically different enough and therefore represent two different populations (the
normal mode and the promiscuous mode populations), the z-statistics [1] model is
used. The z-statistics model allows to make a judgment about whether or not a host’s
NIC is set to the promiscuous mode.
In the real world, the system administration has to identify first the OS of the
suspicious host. This can be done by several available tools, such as Nmap [15].
Then, a number of request packets should be sent to the suspicious host in order to
collect the corresponding RTT measurements.
The suspicious host can be either in the normal mode or in the promiscuous mode.
Two z-statistics are computed. The first one, called the normal mode z-statistics, uses
the training data related to the OS of the suspicious host for the normal mode, as the
first population, and the collected data in the real world, as the second population.
The second z-statistics, called the promiscuous mode z-statistics, uses the training
data related to the OS of the suspicious host for the promiscuous mode, as the first
population, and the collected data, as the second population. If the normal mode z-
statistics is less than the z value (which is 2.36), then we may conclude that the host’s
NIC is almost 99% set to the normal mode, else, the host’s NIC is set to the
promiscuous mode.
The limits of the RTT detection technique: The RTT detection technique is a
probabilistic technique. Many known and unknown factors, such as the operating
system of the suspicious host, and the LAN traffic, may affect considerably the
results generated by any anti-sniffer based on this technique. When the LAN is under
heavy traffic, this probabilistic technique may generate false decision regarding
whether the suspicious host’s NIC card is set to the promiscuous mode or to the
normal mode. This is due mainly on the RTT measurements taken which may lead to
a false decision. In addition, an advanced sniffer may attempt to put heavy traffic in
the network in order to let the anti-sniffer generates misleading results.
The RTT detection technique attempts to send heavy traffic to a suspicious host on
a particular open port, usually the FTP port (21). However, it is not common to have
always the FTP port (21) open in each host in the network. Finally, to work
appropriately, this technique needs to send heavy traffic on the network and then
takes the RTT measurements. Such an action may cause some damage to the
network’s hosts and services, such as denial of service attacks.
282