I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
pu
t
er
E
ng
ineering
(
I
J
E
CE
)
Vo
l.
15
,
No
.
6
,
Dec
em
b
er
20
25
,
p
p
.
6
0
2
7
~
6
0
4
2
I
SS
N:
2088
-
8
7
0
8
,
DOI
: 1
0
.
1
1
5
9
1
/ijece.
v
15
i
6
.
pp
6
0
2
7
-
6
0
4
2
6027
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ec
e.
ia
esco
r
e.
co
m
Im
plementa
tion o
f
a
net
wo
rk in
tru
sio
n det
ec
tion sy
stem f
o
r
ma
n
-
in
-
th
e
-
mid
dl
e attacks
K
ennedy
O
k
o
k
pu
j
ie
1,
2
,
Willi
a
m
A.
Abdu
la
t
ee
f
-
Ado
g
a
1
,
O
g
henet
eg
a
C.
O
wiv
ri
1
,
Ada
o
ra
P
.
I
j
eh
3
,
I
m
ha
de
P
.
O
ko
k
pu
j
ie
4,
5
,
M
o
ra
y
o
E
.
Awo
mo
y
6
1
D
e
p
a
r
t
me
n
t
o
f
El
e
c
t
r
i
c
a
l
a
n
d
I
n
f
o
r
mat
i
o
n
E
n
g
i
n
e
e
r
i
n
g
,
C
o
l
l
e
g
e
o
f
E
n
g
i
n
e
e
r
i
n
g
,
C
o
v
e
n
a
n
t
U
n
i
v
e
r
si
t
y
,
O
t
a
,
N
i
g
e
r
i
a
2
A
f
r
i
c
a
C
e
n
t
r
e
o
f
E
x
c
e
l
l
e
n
c
e
f
o
r
I
n
n
o
v
a
t
i
v
e
a
n
d
Tr
a
n
sf
o
r
m
a
t
i
v
e
S
TE
M
Ed
u
c
a
t
i
o
n
,
La
g
o
s S
t
a
t
e
U
n
i
v
e
r
s
i
t
y
,
La
g
o
s
S
t
a
t
e
,
N
i
g
e
r
i
a
3
D
e
p
a
r
t
me
n
t
o
f
C
o
m
p
u
t
e
r
a
n
d
I
n
f
o
r
m
a
t
i
o
n
S
c
i
e
n
c
e
,
C
o
l
l
e
g
e
o
f
S
c
i
e
n
c
e
a
n
d
Te
c
h
n
o
l
o
g
y
,
C
o
v
e
n
a
n
t
U
n
i
v
e
r
s
i
t
y
,
O
t
a
,
N
i
g
e
r
i
a
4
D
e
p
a
r
t
me
n
t
o
f
M
e
c
h
a
n
i
c
a
l
a
n
d
M
e
c
h
a
t
r
o
n
i
c
s
En
g
i
n
e
e
r
i
n
g
,
A
f
e
B
a
b
a
l
o
l
a
U
n
i
v
e
r
s
i
t
y
,
A
d
o
E
k
i
t
i
,
N
i
g
e
r
i
a
5
D
e
p
a
r
t
me
n
t
o
f
M
e
c
h
a
n
i
c
a
l
a
n
d
I
n
d
u
s
t
r
i
a
l
E
n
g
i
n
e
e
r
i
n
g
Te
c
h
n
o
l
o
g
y
,
U
n
i
v
e
r
si
t
y
o
f
J
o
h
a
n
n
e
s
b
u
r
g
,
J
o
h
a
n
n
e
s
b
u
r
g
,
S
o
u
t
h
A
f
r
i
c
a
6
S
c
h
o
o
l
o
f
I
n
t
e
r
n
a
t
i
o
n
a
l
S
e
r
v
i
c
e
,
A
me
r
i
c
a
n
U
n
i
v
e
r
si
t
y
,
W
a
sh
i
n
g
t
o
n
,
D
.
C
.
,
U
n
i
t
e
d
S
t
a
t
e
s
o
f
A
meri
c
a
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Au
g
3
1
,
2
0
2
4
R
ev
is
ed
Ma
y
5
,
2
0
2
5
Acc
ep
ted
Ma
y
24
,
2
0
2
5
In
tru
si
o
n
d
e
tec
ti
o
n
s
y
ste
m
s
(IDS
)
a
re
c
rit
ica
l
t
o
o
ls
d
e
sig
n
e
d
to
d
e
tec
t
a
n
d
p
re
v
e
n
t
u
n
a
u
th
o
rize
d
a
c
c
e
ss
a
n
d
p
o
ten
ti
a
l
n
e
two
r
k
th
re
a
ts.
W
h
il
e
IDS
i
s
we
ll
-
e
sta
b
li
sh
e
d
i
n
tra
d
it
i
o
n
a
l
wi
re
d
n
e
two
r
k
s,
d
e
p
l
o
y
in
g
t
h
e
m
in
wire
les
s
e
n
v
iro
n
m
e
n
ts
p
re
se
n
ts
d
isti
n
c
t
c
h
a
ll
e
n
g
e
s,
in
c
l
u
d
i
n
g
l
imited
c
o
m
p
u
tati
o
n
a
l
re
so
u
rc
e
s
a
n
d
c
o
m
p
lex
i
n
fra
stru
c
tu
re
c
o
n
f
ig
u
ra
ti
o
n
s.
P
a
c
k
e
t
sn
i
ffin
g
a
n
d
man
-
in
-
th
e
-
m
id
d
le
(M
it
M
)
a
tt
a
c
k
s
a
lso
p
o
se
sig
n
ifi
c
a
n
t
th
re
a
ts,
p
o
ten
ti
a
ll
y
c
o
m
p
ro
m
isin
g
se
n
siti
v
e
d
a
ta
a
n
d
d
isru
p
ti
n
g
c
o
m
m
u
n
ica
ti
o
n
.
Trad
it
i
o
n
a
l
se
c
u
rit
y
m
e
a
su
re
s
li
k
e
firew
a
ll
s
m
a
y
n
o
t
b
e
s
u
fficie
n
t
to
d
e
tec
t
th
e
se
so
p
h
ist
ica
ted
a
tt
a
c
k
s.
Th
is
p
a
p
e
r
imp
lem
e
n
ts
a
n
e
two
r
k
i
n
tr
u
sio
n
d
e
tec
ti
o
n
sy
ste
m
th
a
t
m
o
n
i
to
rs
a
c
o
m
p
u
t
e
r
n
e
two
rk
t
o
d
e
tec
t
Ad
d
re
ss
Re
so
lu
ti
o
n
P
ro
to
c
o
l
sp
o
o
f
in
g
a
tt
a
c
k
s
in
re
a
l
-
ti
m
e
.
Th
e
sy
ste
m
c
o
m
p
rise
s
th
re
e
h
o
st
m
a
c
h
in
e
s
fo
rm
in
g
th
e
n
e
two
r
k
.
Us
in
g
Ka
li
Li
n
u
x
,
a
b
a
sh
sc
rip
t
i
s
d
e
p
lo
y
e
d
to
m
o
n
it
o
r
th
e
n
e
two
rk
f
o
r
si
g
n
s
o
f
a
d
d
re
ss
re
so
lu
ti
o
n
p
r
o
to
c
o
l
(ARP)
p
o
iso
n
i
n
g
.
A
n
e
m
a
il
a
lert
sy
ste
m
is i
n
teg
ra
ted
i
n
to
t
h
e
b
a
sh
sc
rip
t,
r
u
n
n
in
g
i
n
th
e
b
a
c
k
g
ro
u
n
d
a
s
a
se
rv
ice
f
o
r
th
e
n
e
two
rk
a
d
m
in
istrato
r.
Va
rio
u
s
ARP
sp
o
o
fi
n
g
a
tt
a
c
k
sc
e
n
a
rio
s
a
re
p
e
rfo
rm
e
d
o
n
t
h
e
n
e
two
r
k
t
o
e
v
a
lu
a
te
th
e
e
fficie
n
c
y
o
f
t
h
e
n
e
two
rk
IDS.
Re
su
lt
s
in
d
ica
te
t
h
a
t
d
e
p
lo
y
in
g
IDS
a
s
a
b
a
c
k
g
ro
u
n
d
se
rv
ice
e
n
su
re
s
c
o
n
t
i
n
u
o
u
s
p
ro
tec
ti
o
n
a
g
a
i
n
st
ARP
sp
o
o
fi
n
g
a
n
d
p
o
iso
n
i
n
g
.
Th
is
is
c
ru
c
ial
i
n
d
y
n
a
m
ic
n
e
two
rk
e
n
v
ir
o
n
m
e
n
ts
w
h
e
re
th
re
a
ts
m
a
y
a
rise
u
n
e
x
p
e
c
ted
l
y
.
K
ey
w
o
r
d
s
:
Ad
d
r
ess
r
eso
lu
tio
n
p
r
o
to
co
l
p
o
is
o
n
in
g
Ad
d
r
ess
r
eso
lu
tio
n
p
r
o
to
co
l
s
p
o
o
f
in
g
I
n
tr
u
s
io
n
d
etec
tio
n
s
y
s
tem
s
Man
-
in
-
th
e
-
m
id
d
le
attac
k
s
W
ir
eles
s
n
etwo
r
k
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Ken
n
ed
y
Ok
o
k
p
u
jie
Dep
ar
tm
en
t o
f
E
lectr
ical
an
d
I
n
f
o
r
m
atio
n
E
n
g
in
ee
r
in
g
,
C
o
lleg
e
o
f
E
n
g
in
ee
r
i
n
g
,
C
o
v
e
n
an
t
Un
iv
er
s
ity
KM
1
0
I
d
ir
o
k
o
R
o
ad
,
Ota,
Og
u
n
State,
Nig
er
ia
E
m
ail:
k
en
n
ed
y
.
o
k
o
k
p
u
jie@
co
v
en
an
t
u
n
iv
er
s
ity
.
ed
u
.
n
g
1.
I
NT
RO
D
UCT
I
O
N
W
ir
eles
s
n
etwo
r
k
s
ar
e
in
teg
r
al
to
m
o
d
er
n
co
m
m
u
n
icatio
n
,
p
r
o
v
id
in
g
e
x
ten
s
iv
e
co
n
n
ec
tiv
ity
an
d
co
n
v
en
ie
n
ce
.
Ho
wev
er
,
t
h
eir
wid
esp
r
ea
d
ad
o
p
tio
n
h
as
led
to
in
cr
ea
s
ed
s
ec
u
r
ity
v
u
l
n
er
a
b
ilit
ies,
with
cy
b
er
-
attac
k
s
b
ec
o
m
in
g
m
o
r
e
f
r
eq
u
en
t
an
d
s
o
p
h
is
ticated
,
m
ak
in
g
d
etec
tio
n
m
o
r
e
c
h
allen
g
in
g
.
I
n
r
esp
o
n
s
e,
o
r
g
an
izatio
n
s
f
o
cu
s
o
n
r
ed
u
ci
n
g
,
d
etec
tin
g
,
an
d
p
r
ev
e
n
tin
g
th
ese
r
is
k
s
b
y
im
p
lem
en
tin
g
s
y
s
tem
s
tailo
r
ed
to
th
eir
s
p
ec
if
ic
n
etwo
r
k
ty
p
es,
wh
eth
er
wir
ed
o
r
wir
eless
[
1
]
.
T
h
ese
s
y
s
tem
s
s
er
v
e
as
p
r
im
ar
y
o
r
s
ec
o
n
d
ar
y
d
ef
en
s
e
m
ec
h
an
is
m
s
ag
ain
s
t
p
o
ten
tial
th
r
ea
ts
.
I
n
tr
u
s
io
n
d
ete
ctio
n
s
y
s
tem
s
(
I
DS)
ar
e
cr
itica
l
to
o
ls
,
d
esig
n
ed
to
d
etec
t
an
d
p
r
ev
en
t
u
n
au
th
o
r
iz
ed
ac
ce
s
s
an
d
p
o
ten
tial
th
r
e
ats
with
in
n
etwo
r
k
s
.
W
h
ile
I
DS
is
well
-
estab
li
s
h
ed
in
tr
ad
itio
n
al
wir
ed
n
etwo
r
k
s
,
d
ep
lo
y
i
n
g
t
h
em
in
wir
el
ess
en
v
ir
o
n
m
e
n
ts
p
r
esen
ts
d
is
tin
ct
ch
allen
g
es,
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
6
,
Dec
em
b
e
r
20
25
:
6
0
2
7
-
6
0
4
2
6028
in
clu
d
in
g
lim
ited
co
m
p
u
tatio
n
al
r
eso
u
r
ce
s
a
n
d
c
o
m
p
lex
in
f
r
astru
ctu
r
e
co
n
f
i
g
u
r
atio
n
s
.
T
h
ese
ch
allen
g
es
n
ec
ess
itate
in
n
o
v
ativ
e
ap
p
r
o
ac
h
es to
en
s
u
r
e
ad
e
q
u
ate
s
ec
u
r
it
y
m
ea
s
u
r
es.
T
h
e
p
r
im
a
r
y
f
u
n
ctio
n
o
f
I
D
S
is
to
co
n
tin
u
o
u
s
ly
m
o
n
ito
r
n
etwo
r
k
ac
tiv
ities
,
id
en
tify
i
n
g
u
n
u
s
u
al
p
atter
n
s
th
at
m
ay
in
d
icate
s
e
cu
r
ity
b
r
ea
ch
es.
I
DS
ar
e
esp
ec
ially
v
ital
in
en
v
ir
o
n
m
en
ts
wh
er
e
f
u
lly
s
ec
u
r
e
in
f
o
r
m
atio
n
s
y
s
tem
s
ar
e
co
m
p
lex
d
u
e
to
o
p
er
ati
o
n
al
co
n
s
t
r
ain
ts
o
r
leg
ac
y
in
f
r
astru
ctu
r
e
.
B
y
d
etec
tin
g
an
d
r
esp
o
n
d
in
g
to
p
o
ten
tial
th
r
ea
t
s
,
I
DS
p
lay
s
a
cr
u
cial
r
o
le
i
n
m
ain
tain
in
g
th
e
in
teg
r
ity
o
f
i
n
f
o
r
m
atio
n
s
y
s
tem
s
an
d
p
r
o
tectin
g
s
en
s
itiv
e
d
ata
f
r
o
m
u
n
au
t
h
o
r
ized
ac
ce
s
s
.
I
DS
ca
n
b
e
ca
teg
o
r
ized
b
ased
o
n
s
ev
er
al
f
ac
to
r
s
,
in
clu
d
in
g
d
etec
tio
n
m
eth
o
d
s
,
d
ep
lo
y
m
e
n
t
s
tr
ateg
ies,
an
d
in
t
en
d
ed
u
s
e
[
2
]
.
Fo
r
in
s
tan
ce
,
s
ig
n
atu
r
e
-
b
ased
I
DS
r
ely
o
n
k
n
o
wn
th
r
ea
t
p
atter
n
s
,
wh
ile
an
o
m
aly
-
b
ased
s
y
s
tem
s
d
etec
t
d
ev
iatio
n
s
f
r
o
m
n
o
r
m
al
b
eh
a
v
io
r
.
Ad
d
itio
n
ally
,
I
DS
ca
n
b
e
d
ep
lo
y
ed
at
v
ar
i
o
u
s
p
o
in
ts
in
a
n
etwo
r
k
,
s
u
ch
as
h
o
s
t
-
b
ased
I
DS,
wh
ich
m
o
n
ito
r
s
in
d
iv
id
u
al
d
e
v
ices,
an
d
n
etwo
r
k
-
b
ased
I
DS,
wh
ich
o
v
er
s
ee
s
b
r
o
ad
er
n
etwo
r
k
tr
a
f
f
ic.
E
ac
h
ty
p
e
o
f
I
DS
o
f
f
e
r
s
tailo
r
ed
s
o
lu
tio
n
s
to
d
if
f
er
e
n
t
s
ec
u
r
ity
ch
allen
g
es with
in
wir
eless
n
etwo
r
k
s
,
th
er
eb
y
en
s
u
r
i
n
g
d
ata
s
ec
u
r
ity
.
As
wir
eless
n
etwo
r
k
s
co
n
tin
u
e
t
o
ev
o
lv
e,
th
e
r
o
le
o
f
I
DS
will
b
ec
o
m
e
in
cr
ea
s
in
g
ly
im
p
o
r
t
an
t
in
s
af
eg
u
ar
d
in
g
ag
ain
s
t
em
er
g
in
g
th
r
ea
ts
.
Ho
m
e
n
etwo
r
k
s
ar
e
p
ar
ticu
lar
ly
v
u
ln
e
r
ab
le
to
cy
b
e
r
attac
k
s
d
u
e
to
t
h
e
g
r
o
win
g
n
u
m
b
er
o
f
co
n
n
ec
ted
d
ev
ices
an
d
th
e
ev
o
lv
in
g
tactics
o
f
att
ac
k
er
s
[
3
]
.
P
ac
k
e
t
s
n
i
f
f
i
n
g
a
n
d
m
a
n
-
in
-
t
h
e
-
m
i
d
d
le
(
Mi
tM)
att
ac
k
s
p
o
s
e
s
ig
n
i
f
ic
a
n
t
t
h
r
ea
ts
,
p
o
te
n
ti
all
y
co
m
p
r
o
m
is
i
n
g
s
e
n
s
iti
v
e
d
a
t
a
an
d
d
is
r
u
p
t
in
g
co
m
m
u
n
i
ca
ti
o
n
.
T
r
a
d
iti
o
n
a
l
s
e
cu
r
it
y
m
ea
s
u
r
es
li
k
e
f
i
r
e
walls
m
a
y
n
o
t
b
e
s
u
f
f
i
cie
n
t
t
o
d
et
ec
t
t
h
es
e
s
o
p
h
is
ti
ca
t
e
d
atta
c
k
s
[
4
]
.
T
h
is
wo
r
k
im
p
le
m
en
ts
a
n
et
wo
r
k
in
tr
u
s
io
n
d
etec
tio
n
s
y
s
tem
th
at
m
o
n
ito
r
s
a
co
m
p
u
ter
n
etwo
r
k
t
o
d
etec
t
r
ea
l
-
tim
e
m
an
-
in
-
th
e
-
m
id
d
le
attac
k
s
.
T
h
e
s
y
s
tem
co
m
p
r
is
es
th
r
ee
h
o
s
t
m
ac
h
in
es
f
o
r
m
in
g
th
e
n
etwo
r
k
.
Usi
n
g
Kali
L
in
u
x
,
a
b
ash
s
cr
ip
t
is
d
ep
lo
y
ed
to
m
o
n
ito
r
th
e
n
etwo
r
k
f
o
r
s
ig
n
s
o
f
ad
d
r
ess
r
eso
lu
tio
n
p
r
o
t
o
co
l
(
AR
P)
p
o
is
o
n
in
g
.
An
em
ail
a
ler
t
s
y
s
tem
is
in
teg
r
ated
in
to
th
e
b
ash
s
cr
ip
t,
r
u
n
n
in
g
in
t
h
e
b
ac
k
g
r
o
u
n
d
as
a
s
er
v
ice
f
o
r
th
e
n
etwo
r
k
ad
m
in
is
tr
ato
r
.
Var
io
u
s
AR
P
s
p
o
o
f
in
g
attac
k
s
ce
n
ar
io
s
ar
e
p
e
r
f
o
r
m
ed
o
n
th
e
n
etwo
r
k
to
ev
alu
ate
th
e
e
f
f
icien
cy
o
f
th
e
n
etwo
r
k
I
DS.
2.
L
I
T
E
R
AT
U
RE
R
E
VI
E
W
T
h
is
s
ec
tio
n
ex
p
lo
r
es
v
ar
io
u
s
tech
n
o
lo
g
ies
an
d
s
tr
ateg
ies
em
p
lo
y
ed
in
d
ev
elo
p
i
n
g
a
n
et
wo
r
k
I
DS
s
p
ec
if
ically
tailo
r
ed
to
d
etec
t
an
d
m
itig
ate
MI
T
M
attac
k
s
v
ia
AR
P
p
o
is
o
n
in
g
.
T
h
e
p
er
s
is
ten
ce
o
f
cy
b
er
attac
k
s
is
n
o
t
u
n
u
s
u
al
[
5
]
.
T
h
er
e
f
o
r
e,
th
er
e
ar
e
m
o
r
e
attac
k
s
o
n
o
r
g
an
izatio
n
s
th
at
ca
n
r
ec
o
g
n
ize
r
is
k
s
an
d
b
r
ea
ch
es.
T
h
is
s
u
g
g
ests
th
at
o
r
g
a
n
izatio
n
s
th
at
ar
e
n
o
t
as
ad
e
p
t
at
s
p
o
ttin
g
attac
k
s
as
o
th
e
r
s
m
ay
b
e
u
n
awa
r
e
o
f
an
attac
k
o
r
b
ein
g
p
ar
t
o
f
a
b
o
tn
e
t
[
6
]
.
Ad
d
itio
n
ally
,
an
attac
k
c
am
p
aig
n
u
s
in
g
a
d
v
an
ce
d
p
er
s
i
s
ten
t
th
r
ea
t
(
APT)
m
ig
h
t
co
n
tin
u
e
s
tealin
g
d
ata
with
o
u
t
b
ein
g
n
o
ticed
f
o
r
m
o
n
th
s
o
r
y
ea
r
s
.
T
h
is
s
u
g
g
e
s
ts
th
at
th
e
at
tack
f
r
eq
u
e
n
cy
m
a
y
b
e
c
o
m
p
ar
a
b
le
to
th
at
o
f
o
r
g
a
n
izatio
n
s
th
at
c
an
id
en
tify
h
ig
h
attac
k
f
r
e
q
u
en
cy
[
6
]
.
T
wo
s
ig
n
if
ican
t
s
ca
lin
g
p
r
o
b
l
em
s
h
av
e
ar
is
en
o
n
th
e
I
n
ter
n
et
in
r
ec
en
t
y
ea
r
s
as
it
h
as
b
attled
to
m
ain
tain
s
tead
y
an
d
u
n
b
r
o
k
en
g
r
o
wth
[
7
]
:
i)
T
h
e
ca
p
ac
ity
to
d
ir
ec
t
tr
af
f
ic
th
r
o
u
g
h
o
u
t
th
e
ev
er
-
g
r
o
win
g
ar
r
a
y
o
f
n
etwo
r
k
s
th
at
m
ak
e
u
p
th
e
i
n
ter
n
et
an
d
ii)
t
h
e
u
ltima
te
d
e
p
letio
n
o
f
I
Pv
4
a
d
d
r
ess
s
p
ac
e.
2
.
1
.
O
SI
mo
del
T
h
e
OSI
m
o
d
el
s
tan
d
s
f
o
r
o
p
en
s
y
s
tem
in
ter
co
n
n
ec
tio
n
.
T
h
e
OSI
m
o
d
el
is
a
r
ef
er
e
n
c
e
f
o
r
h
o
w
ap
p
licatio
n
s
co
m
m
u
n
icate
o
v
e
r
a
n
etwo
r
k
.
I
t
d
escr
ib
es
th
e
f
l
o
w
o
f
p
ac
k
ets
an
d
h
o
w
th
ey
a
r
e
tr
an
s
m
itted
.
T
h
e
wo
r
k
p
r
esen
ted
in
th
is
p
ap
e
r
f
o
cu
s
es
o
n
l
ay
er
3
(
n
etwo
r
k
lay
er
)
o
f
t
h
e
OSI
m
o
d
el.
T
h
e
n
etwo
r
k
lay
er
is
r
esp
o
n
s
ib
le
f
o
r
r
o
u
ti
n
g
an
d
f
o
r
war
d
in
g
p
ac
k
ets
b
etwe
en
d
ev
ices
o
n
d
if
f
er
en
t
n
etwo
r
k
s
.
I
t
is
r
e
s
p
o
n
s
ib
le
f
o
r
p
r
o
v
id
i
n
g
lo
g
ical
ad
d
r
ess
in
g
,
r
o
u
tin
g
,
an
d
co
n
g
esti
o
n
c
o
n
tr
o
l.
Fig
u
r
e
1
illu
s
tr
ates
th
e
O
SI
m
o
d
el
a
n
d
h
o
w
p
ac
k
ets ar
e
m
o
v
ed
an
d
tr
an
s
f
e
r
r
ed
f
r
o
m
th
e
p
h
y
s
ical
lay
er
to
th
e
ap
p
licatio
n
la
y
er
.
2
.
2
.
I
nte
rnet
pro
t
o
c
o
l a
dd
re
s
s
I
n
ter
n
et
p
r
o
to
co
l
ad
d
r
ess
is
a
b
b
r
ev
iated
as
I
P
Ad
d
r
ess
.
E
v
e
r
y
co
m
p
u
tin
g
d
e
v
ice
co
n
n
ec
te
d
to
an
I
P
n
etwo
r
k
is
g
iv
en
a
u
n
iq
u
e
i
d
e
n
tity
k
n
o
wn
as
an
I
n
ter
n
et
p
r
o
to
co
l
ad
d
r
ess
.
Sin
ce
I
P
v
er
s
io
n
4
(
I
Pv
4
)
,
th
e
m
o
s
t
r
ec
en
t
v
er
s
io
n
o
f
I
P
d
e
f
in
es
a
3
2
-
b
it
ad
d
r
ess
;
th
er
e
ar
e
o
n
ly
2
32
(
4
,
2
9
4
,
9
6
7
,
2
9
6
)
I
Pv
4
a
d
d
r
ess
es
ac
ce
s
s
ib
le.
T
h
e
lim
ited
s
u
p
p
ly
o
f
I
P
ad
d
r
ess
es
wi
ll
s
o
o
n
r
u
n
o
u
t
as
n
ew
m
ar
k
ets
d
ev
elo
p
an
d
a
s
izab
le
f
r
ac
tio
n
o
f
th
e
g
lo
b
al
p
o
p
u
latio
n
q
u
alif
ies
f
o
r
I
P
ad
d
r
ess
es.
T
h
e
f
ac
t
th
at
s
o
m
e
I
P
ad
d
r
ess
s
p
ac
e
h
as
y
et
to
b
e
allo
tted
ef
f
ec
tiv
ely
ex
ac
er
b
ates
th
e
ad
d
r
ess
s
ca
r
city
is
s
u
e
[
8
]
.
E
v
er
y
d
ev
ice
o
n
an
in
ter
n
et
s
er
v
i
ce
p
r
o
v
i
d
er
'
s
(
I
SP
)
n
etwo
r
k
is
g
i
v
en
a
n
I
P
a
d
d
r
es
s
to
id
en
tify
an
d
co
m
m
u
n
icat
e
with
o
th
er
d
ev
ices
o
n
th
e
s
am
e
I
P
n
etwo
r
k
[
8
]
.
T
wo
ty
p
es o
f
I
P Ad
d
r
ess
es a
r
e
cu
r
r
en
tly
an
d
wid
el
y
in
u
s
e,
c
lear
ly
illu
s
tr
ated
in
Fig
u
r
e
2
[
8
]
.
An
I
P
ad
d
r
ess
is
ca
lled
s
ta
tic
if
it
d
o
es
n
o
t
ch
an
g
e
af
ter
b
ein
g
ass
ig
n
ed
to
a
n
etwo
r
k
el
em
en
t.
I
n
co
n
tr
ast,
a
d
y
n
am
ic
I
P a
d
d
r
ess
is
m
o
m
en
tar
ily
is
s
u
ed
to
a
co
m
p
u
ter
o
r
d
e
v
ice
o
n
a
n
etwo
r
k
[
9
]
.
A
d
y
n
am
ic
I
P
ad
d
r
ess
ca
n
b
e
ass
ig
n
ed
t
o
a
n
o
th
er
n
etwo
r
k
e
d
d
e
v
ice
wh
e
n
ev
er
it
is
n
o
t
in
u
s
e.
Netwo
r
k
co
m
p
o
n
e
n
ts
ar
e
ass
ig
n
ed
d
y
n
am
ic
I
P
ad
d
r
ess
es
v
ia
th
e
p
o
in
t
-
to
-
p
o
in
t
p
r
o
t
o
co
l
o
v
er
eth
e
r
n
et
(
PP
Po
E
)
o
r
th
e
d
y
n
am
ic
h
o
s
t
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
I
mp
leme
n
ta
tio
n
o
f a
n
etw
o
r
k
in
tr
u
s
io
n
d
etec
tio
n
s
ystem
fo
r
…
(
K
en
n
ed
y
Oko
kp
u
jie
)
6029
co
n
f
ig
u
r
atio
n
p
r
o
t
o
co
l
(
DHCP
)
.
T
h
is
k
in
d
o
f
I
P
a
d
d
r
ess
is
u
s
ed
b
y
th
e
m
ajo
r
ity
o
f
I
SP
s
o
n
t
h
eir
n
etwo
r
k
s
.
Static I
P a
d
d
r
ess
es a
r
e
m
o
r
e
e
x
p
en
s
iv
e
th
an
d
y
n
am
ic
o
n
es
[
1
0
]
.
Fig
u
r
e
1
.
OSI
m
o
d
el
Fig
u
r
e
2
.
T
y
p
es o
f
I
P a
d
d
r
ess
2
.
2
.
1
.
I
P
a
dd
re
s
s
f
o
rm
a
t
An
I
P
ad
d
r
ess
in
b
i
n
ar
y
f
o
r
m
,
s
u
ch
as
“0
0
0
0
0
0
0
1
.
1
0
1
0
0
0
0
0
.
0
0
0
0
1
0
1
0
.
1
1
1
1
0
0
0
0
,
”
i
s
u
s
ed
b
y
co
m
p
u
ter
s
y
s
tem
s
f
o
r
co
m
m
u
n
icatio
n
an
d
is
th
en
co
n
v
er
ted
to
a
d
ec
im
al
f
o
r
m
at
(
e.
g
.
,
1
.
1
6
0
.
1
0
.
2
4
0
)
f
o
r
u
s
er
co
n
v
en
ie
n
ce
[
1
1
]
.
An
I
P
ad
d
r
ess
i
s
a
3
2
-
b
it
b
in
ar
y
n
u
m
b
er
r
ep
r
esen
ted
as
f
o
u
r
s
ets
o
f
d
ig
its
(
u
s
u
ally
r
ef
er
r
ed
to
as
o
ctets)
s
ep
ar
ated
b
y
d
o
t
s
.
T
h
e
I
P
ad
d
r
ess
is
d
iv
id
ed
in
to
two
s
ec
tio
n
s
:
th
e
Net
I
D,
wh
ich
id
en
tifie
s
th
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
6
,
Dec
em
b
e
r
20
25
:
6
0
2
7
-
6
0
4
2
6030
h
o
s
t'
s
n
etwo
r
k
an
d
ty
p
ically
c
o
n
s
is
ts
o
f
th
e
f
ir
s
t
th
r
ee
o
ctets,
an
d
th
e
Ho
s
t
I
D,
wh
ich
id
e
n
tifie
s
th
e
s
p
ec
if
ic
h
o
s
t w
ith
in
th
at
n
etwo
r
k
an
d
is
r
ep
r
esen
ted
b
y
th
e
f
o
u
r
th
o
ct
et.
2
.
2
.
2
.
I
P
v
4
a
dd
re
s
s
An
I
Pv
4
ad
d
r
ess
is
u
s
ed
to
i
d
en
tify
all
h
o
s
ts
with
in
th
e
s
a
m
e
n
etwo
r
k
.
Fig
u
r
e
3
illu
s
tr
ates
th
e
th
r
ee
class
es
o
f
I
Pv
4
ad
d
r
ess
es,
in
clu
d
in
g
th
ei
r
s
u
b
n
et
m
ask
s
an
d
b
in
ar
y
f
o
r
m
ats.
An
I
Pv
4
ad
d
r
e
s
s
co
n
tain
s
3
2
b
its
,
d
iv
id
ed
in
t
o
f
o
u
r
8
-
b
it
s
eg
m
e
n
ts
s
ep
ar
ated
b
y
p
er
io
d
s
.
I
Pv
4
ad
d
r
ess
es
ar
e
cr
u
cial
in
e
x
ec
u
tin
g
a
m
a
n
-
in
-
th
e
-
m
id
d
le
attac
k
,
as
th
e
attac
k
er
m
u
s
t
id
en
tify
th
e
tar
g
et'
s
I
P
a
d
d
r
ess
.
T
o
o
ls
s
u
ch
as
Netd
i
s
c
o
v
er
ar
e
o
f
ten
u
s
e
d
d
u
r
in
g
th
e
i
n
f
o
r
m
atio
n
-
g
ath
er
in
g
p
h
ase.
Netd
is
co
v
er
is
an
ac
tiv
e/p
ass
iv
e
AR
P
r
ec
o
n
n
aiss
an
ce
to
o
l
in
itially
d
ev
elo
p
e
d
f
o
r
wir
eless
n
etwo
r
k
s
with
o
u
t
DHCP
s
er
v
er
s
.
I
t
ca
n
also
b
e
em
p
lo
y
ed
o
n
s
witch
ed
n
etwo
r
k
s
,
p
ass
iv
ely
d
etec
tin
g
o
n
lin
e
h
o
s
ts
o
r
ac
tiv
ely
s
ea
r
ch
in
g
f
o
r
th
e
m
b
y
s
en
d
in
g
AR
P
r
eq
u
ests
.
T
h
er
e
ar
e
two
ty
p
es
o
f
I
Pv
4
ad
d
r
ess
es:
Priv
ate
I
P
Ad
d
r
ess
es
ar
e
g
en
er
ated
b
y
a
DHCP
s
er
v
er
an
d
ass
ig
n
ed
with
in
p
r
iv
at
e
n
etwo
r
k
s
,
s
u
ch
as
h
o
m
es.
T
h
e
class
o
f
th
e
I
Pv
4
ad
d
r
ess
d
eter
m
in
es
th
e
s
p
ec
if
ic
r
an
g
e,
with
m
o
s
t
p
r
iv
ate
n
etwo
r
k
s
u
s
in
g
C
lass
C
,
wh
i
ch
s
u
p
p
o
r
ts
u
p
to
2
5
4
h
o
s
ts
with
a
s
u
b
n
et
m
ask
o
f
2
5
5
.
2
5
5
.
2
5
5
.
0
.
Fig
u
r
e
3
p
r
esen
ts
th
e
th
r
ee
class
es
o
f
p
r
iv
ate
I
Pv
4
ad
d
r
ess
es.
An
ex
a
m
p
le
o
f
a
C
lass
C
I
Pv
4
ad
d
r
e
s
s
is
1
9
2
.
1
6
8
.
1
0
0
.
0
.
Pu
b
lic
I
P
Ad
d
r
ess
es
ar
e
u
s
ed
to
id
en
tify
a
n
in
ter
n
et
s
er
v
ic
e
p
r
o
v
i
d
er
(
I
SP
)
,
d
o
m
ain
n
a
m
e,
o
r
o
r
g
a
n
izatio
n
.
I
t
s
er
v
es
as
a
u
n
iq
u
e
id
en
tifie
r
,
en
ab
lin
g
d
ev
ices
to
c
o
m
m
u
n
icate
with
ea
ch
o
th
er
an
d
ac
ce
s
s
o
n
lin
e
r
eso
u
r
ce
s
[
1
2
]
.
Fig
u
r
e
3
.
I
PV4
a
d
d
r
ess
f
o
r
m
at
2
.
2
.
3
.
Su
bn
et
m
a
s
k
A
s
u
b
n
et
m
ask
is
u
s
ed
to
d
et
er
m
in
e
th
e
n
etwo
r
k
a
n
d
h
o
s
t
p
o
r
tio
n
s
o
f
an
I
Pv
4
ad
d
r
ess
b
y
m
ask
in
g
th
e
n
etwo
r
k
ad
d
r
ess
.
T
h
e
n
et
wo
r
k
a
d
d
r
ess
co
n
tain
s
th
e
i
n
f
o
r
m
atio
n
n
ec
ess
ar
y
f
o
r
r
o
u
tin
g
p
ac
k
ets.
I
n
m
o
s
t
p
r
iv
ate
h
o
m
es,
a
c
lass
C
I
Pv
4
ad
d
r
ess
is
u
s
ed
,
wh
ich
s
u
p
p
o
r
ts
u
p
t
o
2
5
4
h
o
s
ts
.
I
d
en
tific
atio
n
o
f
ea
ch
h
o
s
t
is
s
tr
aig
h
tf
o
r
war
d
,
as
th
e
f
ir
s
t
th
r
ee
o
ctets
r
em
ain
co
n
s
tan
t
wh
ile
th
e
f
o
u
r
th
o
ctet
v
ar
ies.
I
n
a
C
lass
C
ad
d
r
ess
s
u
ch
as
1
9
2
.
1
6
8
.
1
0
0
.
1
with
a
s
u
b
n
et
m
ask
o
f
2
5
5
.
2
5
5
.
2
5
5
.
0
,
th
e
n
etwo
r
k
I
D
is
1
9
2
.
1
6
8
.
1
0
0
,
wh
ile
th
e
last
o
ctet
r
ep
r
esen
ts
th
e
Ho
s
t
I
D.
All
d
ev
ices
o
n
th
at
n
etwo
r
k
s
h
ar
e
th
e
s
am
e
n
etwo
r
k
I
D
b
u
t
h
av
e
u
n
iq
u
e
Ho
s
t
I
Ds
[
1
3
]
.
2
.
3
.
Da
t
a
t
r
a
ns
m
is
s
io
n
T
r
an
s
f
er
r
in
g
d
ata
b
etwe
en
n
etwo
r
k
ed
d
ev
ices
r
e
q
u
ir
es
ad
h
e
r
en
ce
to
s
p
ec
if
ic
p
r
o
to
co
ls
,
w
h
ich
v
a
r
y
d
ep
en
d
i
n
g
o
n
w
h
eth
er
th
e
d
e
v
ices a
r
e
d
ir
ec
tly
o
r
r
em
o
tely
c
o
n
n
ec
ted
.
A
cr
itical
f
ac
to
r
in
d
eter
m
in
in
g
th
e
d
ata
d
eliv
er
y
m
eth
o
d
is
wh
eth
er
th
e
s
en
d
er
an
d
r
ec
eiv
er
ar
e
with
in
th
e
s
am
e
b
r
o
ad
ca
s
t d
o
m
ain
,
o
f
ten
ca
lled
v
ir
tu
al
lo
ca
l
ar
ea
n
etwo
r
k
(
VL
AN)
.
C
o
m
m
u
n
icatio
n
with
in
th
e
s
a
m
e
b
r
o
ad
ca
s
t
d
o
m
ain
u
s
es
s
witch
es
an
d
m
ed
iu
m
ac
ce
s
s
co
n
tr
o
l (
MA
C
)
ad
d
r
ess
es,
wh
ile
co
m
m
u
n
icatio
n
ac
r
o
s
s
d
o
m
ain
s
r
eq
u
ir
es a
r
o
u
ter
a
n
d
I
P a
d
d
r
ess
es.
2
.
3
.
1
De
f
a
ult
g
a
t
ewa
y
T
h
e
d
ef
a
u
lt
g
atew
ay
is
th
e
c
o
n
n
ec
tio
n
p
o
i
n
t
b
etwe
en
d
ev
ices
in
d
if
f
er
e
n
t
b
r
o
ad
ca
s
t
d
o
m
ain
s
.
I
t
f
u
n
ctio
n
s
as
a
“d
o
o
r
way
”
th
at
allo
ws
d
ata
to
p
ass
f
r
o
m
o
n
e
b
r
o
ad
ca
s
t
d
o
m
ai
n
to
a
n
o
th
er
.
L
ay
er
3
d
ev
ices
lik
e
r
o
u
ter
s
o
r
m
u
ltil
ay
er
s
witch
es
ty
p
ically
ac
t
as
th
e
d
ef
au
lt
g
atew
ay
,
f
ac
ilit
atin
g
co
m
m
u
n
icatio
n
b
ey
o
n
d
th
e
lo
ca
l n
etwo
r
k
[
1
4
]
.
2
.
3
.
2
T
ra
ns
m
is
s
io
n c
o
ntr
o
l pro
t
o
co
l
T
h
e
tr
an
s
m
is
s
io
n
co
n
tr
o
l
p
r
o
to
co
l
(
T
C
P)
is
a
co
m
m
u
n
icatio
n
p
r
o
to
c
o
l
th
at
o
p
er
ates
with
in
th
e
in
ter
n
et
p
r
o
to
c
o
l
(
I
P)
m
o
d
el,
wh
ich
is
s
tr
u
ctu
r
ed
in
to
f
o
u
r
lay
er
s
:
n
etwo
r
k
ac
ce
s
s
(
li
n
k
lay
er
)
,
n
etwo
r
k
,
tr
an
s
p
o
r
t,
an
d
ap
p
licatio
n
.
T
h
ese
lay
er
s
co
r
r
esp
o
n
d
to
lay
er
s
1
-
2
,
3
,
4
,
an
d
5
-
7
o
f
th
e
OSI
m
o
d
el
r
ep
r
esen
ted
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
I
mp
leme
n
ta
tio
n
o
f a
n
etw
o
r
k
in
tr
u
s
io
n
d
etec
tio
n
s
ystem
fo
r
…
(
K
en
n
ed
y
Oko
kp
u
jie
)
6031
in
Fig
u
r
e
1
,
r
esp
ec
tiv
ely
.
W
h
ile
T
C
P
i
s
co
m
m
o
n
ly
u
s
ed
in
n
etwo
r
k
co
m
m
u
n
icatio
n
s
,
it
is
o
f
ten
r
ef
er
r
ed
to
as
a
l
ay
er
4
p
r
o
to
co
l
in
th
e
OSI
m
o
d
el
d
u
e
to
its
o
p
e
r
atio
n
at
t
h
e
t
r
an
s
p
o
r
t
lay
er
[
1
4
]
.
T
h
e
T
C
P
i
s
a
s
tan
d
ar
d
th
at
estab
lis
h
es
a
s
tr
o
n
g
co
n
n
ec
tio
n
b
etwe
en
th
e
clien
t
an
d
a
s
er
v
er
an
d
allo
ws
ap
p
licatio
n
p
r
o
g
r
am
s
to
ex
ch
an
g
e
d
ata.
T
C
P
is
v
er
y
r
eliab
le
an
d
s
tab
le.
Fo
r
a
T
C
P
co
n
n
ec
tio
n
to
g
o
th
r
o
u
g
h
,
it
h
as
to
u
n
d
e
r
g
o
th
e
p
r
o
ce
s
s
o
f
a
th
r
ee
-
way
h
an
d
s
h
ak
e.
T
h
e
th
r
ee
-
way
h
an
d
s
h
a
k
e
is
a
p
r
o
ce
d
u
r
e
u
s
ed
to
estab
lis
h
an
d
m
a
in
tain
a
co
n
n
ec
tio
n
b
etwe
en
a
clien
t
an
d
a
h
o
s
t,
in
v
o
lv
in
g
s
p
ec
if
ic
T
C
P
f
lag
s
:
SYN,
AC
K,
FIN
,
R
ST,
an
d
PS
H,
illu
s
tr
ated
in
Fig
u
r
e
4
.
As illu
s
tr
ated
in
Fig
u
r
e
s
4
(
a)
-
(
b
)
,
th
e
p
r
o
ce
s
s
o
f
estab
lis
h
in
g
a
T
C
P c
o
n
n
ec
tio
n
o
cc
u
r
s
in
th
r
ee
s
tep
s
:
−
Step
1
:
T
h
e
clien
t
(
W
illi
am
)
i
n
itiates
th
e
co
n
n
ec
tio
n
b
y
s
en
d
in
g
a
SYN
p
ac
k
et
to
th
e
s
er
v
er
(
Ko
d
i)
with
a
r
an
d
o
m
s
eq
u
en
ce
n
u
m
b
er
.
−
Step
2
:
T
h
e
s
er
v
er
(
Ko
d
i)
r
esp
o
n
d
s
with
a
SYN
-
A
C
K
p
ac
k
et,
ac
k
n
o
wled
g
in
g
th
e
c
o
n
n
ec
tio
n
an
d
s
y
n
ch
r
o
n
izi
n
g
with
th
e
clien
t
u
s
in
g
a
s
eq
u
en
ce
n
u
m
b
er
o
f
X
+1
.
−
Step
3
:
T
h
e
clien
t
(
W
illi
am
)
co
m
p
letes
t
h
e
co
n
n
ec
tio
n
b
y
s
en
d
in
g
a
n
AC
K
f
lag
,
ac
k
n
o
wled
g
in
g
th
e
s
er
v
er
'
s
SY
N
f
lag
with
a
s
eq
u
en
ce
n
u
m
b
er
o
f
Y+
1
.
(
a)
(
b
)
Fig
u
r
e
4
.
T
C
P
-
b
ased
co
n
n
ec
ti
o
n
(
a)
clien
t a
n
d
s
er
v
er
co
n
n
e
ctin
g
an
d
(
b
)
clien
t a
n
d
s
er
v
e
r
d
is
co
n
n
ec
tin
g
2
.
3
.
3
.
Switc
h a
nd
M
AC
a
dd
r
ess
A
s
witch
is
a
n
etwo
r
k
d
ev
ice
t
h
at
f
ac
ilit
ates
co
m
m
u
n
icatio
n
b
etwe
en
h
o
s
ts
v
ia
th
eir
MA
C
ad
d
r
ess
es,
en
s
u
r
in
g
th
at
p
ac
k
et
in
f
o
r
m
atio
n
is
n
o
t
leak
ed
to
o
t
h
er
h
o
s
ts
.
I
t
is
an
ad
v
an
ce
d
v
er
s
io
n
o
f
a
h
u
b
an
d
co
n
tain
s
s
ev
er
al
p
h
y
s
ical
p
o
r
ts
th
at
s
to
r
e
d
if
f
e
r
en
t
h
o
s
t
MA
C
ad
d
r
es
s
es.
T
h
e
MA
C
ad
d
r
ess
is
a
u
n
iq
u
e,
p
h
y
s
ical,
an
d
p
er
m
an
en
t
id
en
tifie
r
u
s
ed
f
o
r
co
m
m
u
n
icatio
n
b
etwe
en
d
ev
ic
es.
Switch
es
ar
e
cr
itical
in
AR
P
s
p
o
o
f
in
g
,
as
th
e
y
f
o
r
war
d
p
ac
k
ets b
ased
o
n
MA
C
ad
d
r
ess
es.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
6
,
Dec
em
b
e
r
20
25
:
6
0
2
7
-
6
0
4
2
6032
2
.
3
.
4
.
Address
re
s
o
l
utio
n pro
t
o
co
l
T
h
e
a
d
d
r
ess
r
eso
lu
tio
n
p
r
o
to
co
l
(
AR
P)
i
s
a
f
u
n
d
am
en
tal
p
r
o
to
co
l
in
th
e
in
ter
n
et
p
r
o
to
co
l
s
u
ite
(
T
C
P/IP)
u
s
ed
to
r
eso
lv
e
an
I
P
ad
d
r
ess
in
to
a
MA
C
ad
d
r
ess
.
T
h
e
ad
d
r
ess
r
eso
lu
tio
n
p
r
o
t
o
co
l
o
cc
u
r
s
in
th
e
n
etwo
r
k
la
y
er
.
I
t
allo
ws
u
s
to
co
m
m
u
n
icate
with
o
th
e
r
h
o
s
ts
u
n
d
e
r
th
e
s
am
e
n
etwo
r
k
a
n
d
t
h
e
d
ef
a
u
lt
g
atew
ay
.
T
h
e
AR
P
m
ap
s
I
P
ad
d
r
ess
es
to
MA
C
a
d
d
r
ess
es,
en
ab
lin
g
d
ata
tr
an
s
m
is
s
io
n
b
etwe
en
d
ev
ices.
Fig
u
r
e
5
d
em
o
n
s
tr
ates
th
e
two
f
u
n
ctio
n
s
o
f
t
h
e
AR
P.
W
h
en
h
o
s
t
A
n
ee
d
s
to
s
en
d
d
ata
to
H
o
s
t
B
,
it
k
n
o
ws
its
I
P
ad
d
r
ess
(
1
7
2
.
1
6
.
3
.
2
)
b
u
t
r
eq
u
ir
es
its
MA
C
ad
d
r
ess
.
Ho
s
t
A
s
en
d
s
an
AR
P
r
eq
u
est
as
k
in
g
f
o
r
th
e
MA
C
ad
d
r
ess
ass
o
ciate
d
wi
th
th
e
I
P
ad
d
r
ess
1
7
2
.
1
6
.
3
.
2
.
Ho
s
t
B
r
esp
o
n
d
s
with
its
M
AC
ad
d
r
ess
(
0
8
0
0
.
0
2
0
0
.
1
1
1
1
)
.
On
ce
h
o
s
t
a
r
ec
eiv
es
th
is
in
f
o
r
m
atio
n
,
th
e
d
ata
ca
n
b
e
s
e
n
t.
AR
P
also
m
ain
tain
s
a
ca
ch
e
o
f
I
P
-
to
-
MA
C
ass
o
ciatio
n
s
,
elim
in
atin
g
th
e
n
ee
d
f
o
r
r
e
p
ea
ted
AR
P
r
eq
u
ests
wh
en
s
en
d
in
g
ad
d
itio
n
al
d
at
a
to
th
e
s
am
e
h
o
s
t,
th
er
eb
y
s
p
ee
d
in
g
u
p
th
e
d
ata
d
eliv
er
y
p
r
o
ce
s
s
[
1
5
]
.
Fig
u
r
e
5
.
Ad
d
r
ess
r
eso
lu
tio
n
p
r
o
to
co
l (
AR
P)
r
eq
u
est
[
1
5
]
2
.
3
.
5
.
ARP
s
po
o
f
ing
I
n
AR
P
s
p
o
o
f
in
g
,
an
attac
k
er
s
en
d
s
f
ak
e
AR
P
r
esp
o
n
s
es
to
m
an
ip
u
late
th
e
MA
C
ad
d
r
ess
tab
le
o
n
a
s
witch
.
W
h
en
a
f
ak
e
AR
P
r
esp
o
n
s
e
with
a
f
r
a
u
d
u
le
n
t
MA
C
ad
d
r
ess
is
r
ec
eiv
ed
,
th
e
s
witch
u
p
d
ates
its
MA
C
ad
d
r
ess
tab
le
with
th
e
in
c
o
r
r
ec
t
in
f
o
r
m
atio
n
.
As
a
r
esu
lt,
th
e
s
witch
f
o
r
wa
r
d
s
p
ac
k
et
s
to
th
e
attac
k
er
'
s
m
ac
h
in
e,
m
is
tak
en
ly
id
e
n
tify
i
n
g
it
as
th
e
o
r
ig
in
al
d
ev
ice.
Fig
u
r
e
6
illu
s
tr
ates
h
o
w
a
n
a
ttack
er
p
o
is
o
n
s
th
e
AR
P
ca
ch
e.
B
y
alter
in
g
th
e
MA
C
ad
d
r
ess
tab
le,
th
e
attac
k
er
ca
n
i
n
ter
ce
p
t
tr
a
f
f
ic
in
ten
d
ed
f
o
r
th
e
o
r
ig
in
a
l
d
ev
ice,
en
a
b
lin
g
ea
v
esd
r
o
p
p
in
g
,
m
alwa
r
e
in
jectio
n
,
o
r
t
h
e
th
ef
t o
f
s
en
s
itiv
e
in
f
o
r
m
atio
n
.
Fig
u
r
e
6
.
AR
P sp
o
o
f
in
g
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
I
mp
leme
n
ta
tio
n
o
f a
n
etw
o
r
k
in
tr
u
s
io
n
d
etec
tio
n
s
ystem
fo
r
…
(
K
en
n
ed
y
Oko
kp
u
jie
)
6033
2
.
3
.
6
.
I
nte
rnet
co
ntr
o
l m
ess
a
g
e
pro
t
o
co
l
Ov
er
th
e
i
n
ter
n
et,
n
etwo
r
k
p
r
o
b
lem
s
ca
n
b
e
i
d
en
tifie
d
u
s
in
g
th
e
in
ter
n
et
c
o
n
tr
o
l
m
ess
ag
e
p
r
o
to
c
o
l
(
I
C
MP)
.
Netwo
r
k
d
e
v
ices
em
p
lo
y
th
e
in
ter
n
et
c
o
n
tr
o
l
m
ess
ag
e
p
r
o
to
co
l,
a
n
etwo
r
k
lay
er
p
r
o
to
co
l,
to
id
e
n
tify
p
r
o
b
lem
s
with
n
etwo
r
k
co
n
n
e
ctiv
ity
.
T
h
e
p
r
im
ar
y
p
u
r
p
o
s
e
o
f
I
C
MP
i
s
to
a
s
ce
r
tain
wh
eth
er
o
r
n
o
t d
ata
ar
r
iv
es
at
its
d
esti
n
atio
n
o
n
tim
e.
T
h
e
I
C
MP
p
r
o
to
co
l
is
f
r
eq
u
en
tly
u
tili
ze
d
o
n
n
etwo
r
k
eq
u
i
p
m
en
t,
in
clu
d
in
g
r
o
u
te
r
s
.
B
esid
es
b
ein
g
u
s
ef
u
l
f
o
r
test
in
g
an
d
e
r
r
o
r
r
ep
o
r
tin
g
,
I
C
MP
co
u
ld
also
b
e
em
p
lo
y
ed
in
d
is
tr
ib
u
ted
d
en
ial
-
of
-
s
er
v
ice
(
DDo
S)
ass
au
lts
[
1
6
]
.
2
.
3
.
7
.
L
3
hea
der
T
h
e
L
3
h
ea
d
er
s
ar
e
u
s
ed
to
r
o
u
te
d
ata
p
ac
k
ets
b
etwe
en
n
etwo
r
k
s
.
Fra
m
es
en
ca
p
s
u
la
te
d
ata
f
o
r
tr
an
s
m
is
s
io
n
o
v
er
a
p
h
y
s
ical
m
ed
iu
m
,
s
u
ch
as
a
n
etwo
r
k
ca
b
le.
Fra
m
es
co
n
tain
a
d
ata
p
ay
lo
ad
,
wh
ic
h
in
clu
d
es
th
e
in
f
o
r
m
atio
n
f
o
r
th
at
p
ac
k
et.
L
3
h
ea
d
er
s
co
n
tain
co
n
tr
o
l
in
f
o
r
m
atio
n
,
s
u
ch
as
r
o
u
tin
g
in
f
o
r
m
atio
n
,
ch
ec
k
s
u
m
s
,
an
d
s
o
u
r
ce
an
d
d
esti
n
atio
n
ad
d
r
ess
es.
L
3
h
ea
d
er
s
h
av
e
a
s
tan
d
ar
d
ized
f
o
r
m
a
t
th
at
is
d
ef
in
e
d
b
y
th
e
p
r
o
to
c
o
l.
Fig
u
r
e
7
s
h
o
ws t
h
e
L
3
h
ea
d
er
f
o
r
m
at.
Fig
u
r
e
7
.
L
3
h
ea
d
er
f
o
r
m
at
2
.
3
.
8
.
P
a
c
k
et
t
r
a
ns
m
is
s
io
n
Fo
r
a
p
ac
k
et
to
r
ea
c
h
its
d
esti
n
atio
n
,
th
e
s
y
s
tem
n
ee
d
s
th
e
s
o
u
r
ce
I
P,
d
esti
n
atio
n
I
P,
s
o
u
r
ce
MA
C
ad
d
r
ess
,
an
d
d
esti
n
atio
n
MA
C
ad
d
r
ess
[
1
4
]
.
An
AR
P
r
eq
u
est
is
is
s
u
ed
if
th
e
d
esti
n
atio
n
MA
C
is
u
n
k
n
o
wn
.
T
h
e
p
ac
k
et
is
co
n
s
id
er
e
d
co
m
p
lete
an
d
r
ea
d
y
f
o
r
f
o
r
war
d
in
g
o
n
ce
th
e
AR
P
p
r
o
ce
s
s
r
eso
lv
es
th
e
MA
C
ad
d
r
ess
.
Fu
n
d
am
e
n
tal
p
r
in
cip
l
es o
f
p
ac
k
et
d
eliv
er
y
in
cl
u
d
e:
−
MA
C
ad
d
r
ess
es d
o
n
o
t le
av
e
t
h
eir
b
r
o
ad
ca
s
t d
o
m
ain
.
−
AR
P r
eso
lu
tio
n
is
p
r
io
r
itized
if
n
ec
ess
ar
y
.
−
Pack
ets ar
e
d
eliv
er
ed
d
i
r
ec
tly
to
th
e
d
esti
n
atio
n
if
b
o
th
d
ev
ic
es a
r
e
in
th
e
s
am
e
n
etwo
r
k
.
−
I
f
th
e
d
esti
n
atio
n
is
in
a
d
if
f
er
en
t
n
etwo
r
k
,
th
e
p
ac
k
et
is
f
ir
s
t
s
en
t
to
th
e
d
e
f
au
lt
g
atew
ay
b
ef
o
r
e
r
ea
ch
in
g
th
e
d
esti
n
atio
n
Fig
u
r
e
8
d
em
o
n
s
tr
ates
p
ac
k
et
tr
an
s
m
is
s
io
n
with
in
a
n
etwo
r
k
to
p
o
lo
g
y
with
f
o
u
r
h
o
s
ts
.
W
h
en
Ho
s
t
1
(
I
P:
1
0
.
1
0
.
1
0
.
1
/2
4
)
p
in
g
s
Ho
s
t
4
(
I
P:
1
0
.
1
0
.
1
0
.
4
/2
4
)
,
an
in
ter
n
et
co
n
tr
o
l
m
ess
ag
e
p
r
o
to
c
o
l
(
I
C
MP
)
ec
h
o
r
e
q
u
est
is
g
en
er
ated
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
6
,
Dec
em
b
e
r
20
25
:
6
0
2
7
-
6
0
4
2
6034
Fig
u
r
e
8
.
Pack
et
tr
a
n
s
m
is
s
io
n
with
in
a
n
etwo
r
k
t
o
p
o
lo
g
y
wit
h
f
o
u
r
h
o
s
ts
T
h
e
n
etwo
r
k
p
er
f
o
r
m
s
AND
o
p
er
atio
n
s
with
th
e
s
u
b
n
et
m
a
s
k
s
if
b
o
t
h
I
P
ad
d
r
ess
es
ar
e
i
n
th
e
s
am
e
s
u
b
n
et.
T
h
e
n
ex
t
-
h
o
p
I
P
ad
d
r
e
s
s
is
d
eter
m
in
ed
s
in
ce
b
o
th
h
o
s
ts
ar
e
with
in
th
e
s
am
e
n
etwo
r
k
(
1
0
.
1
0
.
1
0
.
0
/2
4
)
.
I
f
th
e
AR
P
tab
le
d
o
es
n
o
t
co
n
tain
th
e
n
ex
t
-
h
o
p
I
P
ad
d
r
ess
,
th
e
p
ac
k
et
is
b
u
f
f
er
ed
wh
ile
an
AR
P
r
eq
u
est
i
s
b
r
o
ad
ca
s
ted
.
T
h
e
s
witch
(
S1
)
ch
ec
k
s
f
o
r
th
e
s
o
u
r
ce
MA
C
a
d
d
r
ess
in
its
co
n
te
n
t
ad
d
r
ess
ab
le
m
em
o
r
y
(
C
AM
)
tab
le,
ad
d
s
an
en
tr
y
if
n
o
n
e
e
x
is
ts
,
an
d
b
r
o
ad
ca
s
ts
th
e
AR
P
f
r
am
e
to
all
p
o
r
ts
in
th
e
s
am
e
b
r
o
ad
ca
s
t
d
o
m
ain
.
Ho
s
ts
th
at
d
o
n
o
t
m
atch
th
e
d
e
s
tin
atio
n
I
P
ad
d
r
ess
d
is
ca
r
d
th
e
f
r
am
e,
wh
ile
th
e
co
r
r
ec
t
h
o
s
t
(
Ho
s
t
4
)
r
esp
o
n
d
s
with
its
MA
C
ad
d
r
ess
.
T
h
e
r
esp
o
n
s
e
is
u
n
icast
b
ac
k
to
Ho
s
t
1
,
wh
ich
u
p
d
ates
its
AR
P
tab
le,
ex
tr
ac
ts
th
e
b
u
f
f
er
e
d
p
ac
k
et,
an
d
co
m
p
letes
th
e
tr
an
s
m
is
s
io
n
.
Ho
s
t
4
th
e
n
r
ep
lies
to
th
e
in
te
r
n
et
co
n
tr
o
l
m
ess
ag
e
p
r
o
to
co
l
(
I
C
MP
)
ec
h
o
r
eq
u
est
,
r
esu
ltin
g
in
a
s
u
cc
ess
f
u
l p
in
g
.
2
.
4
.
M
a
n
-
in
-
t
he
-
m
idd
le
(
M
it
M
)
a
t
t
a
c
k
A
m
an
-
in
-
t
h
e
-
m
id
d
le
(
MitM
)
attac
k
o
cc
u
r
s
wh
en
an
attac
k
er
in
s
er
ts
th
em
s
elv
es
b
etwe
e
n
a
s
en
d
e
r
an
d
a
r
ec
eiv
er
,
i
n
ter
ce
p
tin
g
a
n
d
alter
in
g
tr
af
f
ic
f
l
o
w
b
etwe
en
th
e
two
co
m
m
u
n
icatin
g
p
ar
tie
s
[
1
7
]
.
T
h
is
allo
ws
th
e
attac
k
er
to
ea
v
esd
r
o
p
,
m
o
d
if
y
,
an
d
r
etr
an
s
m
it
d
ata.
Sev
er
al
m
eth
o
d
s
ca
n
b
e
u
s
ed
to
ex
ec
u
te
a
MitM
attac
k
,
in
clu
d
in
g
DNS
s
p
o
o
f
i
n
g
,
AR
P
s
p
o
o
f
in
g
,
an
d
DHC
P
s
p
o
o
f
in
g
,
with
AR
P
s
p
o
o
f
in
g
b
ein
g
th
e
p
r
im
ar
y
f
o
cu
s
o
f
t
h
is
p
ap
er
.
MitM
attac
k
s
p
o
s
e
s
ig
n
if
ican
t
r
is
k
s
,
in
clu
d
in
g
id
en
tity
th
ef
t
,
p
r
iv
ac
y
b
r
ea
ch
es,
an
d
d
ata
lo
s
s
.
T
h
ese
attac
k
s
ca
n
b
e
class
if
ied
in
to
two
ca
teg
o
r
ies:
th
o
s
e
tar
g
etin
g
th
e
OSI
m
o
d
el'
s
u
p
p
er
la
y
e
r
s
(
3
-
6
)
an
d
th
o
s
e
tar
g
etin
g
t
h
e
lo
wer
lay
e
r
s
(
1
-
2
)
.
W
i
-
Fi
d
e
v
ices
ty
p
ically
u
s
e
o
m
n
id
ir
ec
tio
n
al
a
n
ten
n
as
t
h
at
b
r
o
ad
ca
s
t
d
ata
with
in
a
s
p
ec
if
ic
r
an
g
e,
m
a
k
i
n
g
th
em
s
u
s
ce
p
tib
le
to
p
ac
k
e
t
s
n
if
f
in
g
b
y
attac
k
er
s
wh
o
p
lace
th
eir
wir
eless
ad
ap
ter
s
in
“
m
o
n
ito
r
m
o
d
e.
”
en
cr
y
p
tio
n
at
v
ar
io
u
s
OSI
m
o
d
el
lay
er
s
,
s
u
ch
as
HT
T
PS
/SS
L
,
VPNs
,
o
r
W
i
-
Fi
en
cr
y
p
tio
n
p
r
o
to
co
ls
(
W
E
P,
W
PA1
,
W
P
A2
,
W
PA3
)
,
ca
n
m
itig
ate
p
ac
k
et
s
n
if
f
i
n
g
.
Ho
wev
er
,
p
u
b
lic
W
i
-
Fi
n
etwo
r
k
s
,
o
f
ten
lac
k
in
g
lay
er
two
en
cr
y
p
tio
n
,
r
em
ai
n
p
ar
ticu
lar
ly
v
u
ln
er
ab
le.
Mit
M
attac
k
s
ex
p
lo
it
in
ter
m
ed
iar
ies
(
e.
g
.
,
r
o
u
ter
s
)
n
ec
ess
ar
y
f
o
r
n
etwo
r
k
m
ess
ag
e
tr
an
s
m
is
s
io
n
.
Attack
er
s
ca
n
h
ijack
th
ese
in
ter
m
ed
iar
ies
to
in
ter
ce
p
t
o
r
alter
d
ata.
MitM
attac
k
s
ca
n
t
ar
g
et
m
u
ltip
le
OSI
lay
er
s
:
th
e
Ap
p
licatio
n
lay
er
(
e.
g
.
,
DNS
s
p
o
o
f
in
g
,
SS
L
h
ijack
in
g
)
,
th
e
n
etwo
r
k
lay
er
(
e.
g
.
,
AR
P
p
o
is
o
n
in
g
)
,
an
d
th
e
d
ata
lin
k
lay
er
(
e.
g
.
,
an
ten
n
a
id
e
n
tity
s
p
o
o
f
in
g
)
.
At
tack
er
s
ty
p
ically
lau
n
ch
MitM
attac
k
s
o
n
W
i
-
Fi
n
etwo
r
k
s
b
y
s
n
if
f
in
g
t
h
e
W
i
-
Fi
s
p
ec
tr
u
m
,
cr
ea
tin
g
a
f
ak
e
ac
ce
s
s
p
o
in
t,
an
d
lu
r
in
g
clien
ts
to
c
o
n
n
ec
t to
it,
e
n
ab
lin
g
th
e
in
ter
ce
p
tio
n
o
f
d
ata.
2
.
5
.
Rev
iew
o
f
re
la
t
ed
wo
rks
Aim
s
to
id
en
tify
m
an
-
in
-
th
e
-
m
id
d
le
(
MitM
)
attac
k
s
o
n
wir
eless
n
etwo
r
k
s
[
1
7
]
.
T
h
e
r
esear
ch
f
o
c
u
s
ed
o
n
th
e
p
h
y
s
ical
lay
er
o
f
th
e
OSI
m
o
d
el,
ex
a
m
in
in
g
el
ec
tr
o
m
ag
n
etic
ac
ti
v
ity
to
d
e
tect
s
ig
n
al
p
atter
n
s
in
d
icativ
e
o
f
s
u
ch
attac
k
s
.
T
h
e
s
tu
d
y
f
ir
s
t
ev
alu
ated
th
e
p
r
o
tectio
n
lev
els
ass
o
ciate
d
wit
h
W
i
-
Fi
s
tan
d
ar
d
s
,
f
o
llo
wed
b
y
a
d
etailed
d
escr
ip
tio
n
o
f
co
m
m
o
n
MitM
attac
k
p
r
o
ce
d
u
r
es
o
n
co
r
p
o
r
ate,
p
u
b
l
ic,
an
d
p
r
iv
ate
W
i
-
Fi
n
etwo
r
k
s
.
B
ased
o
n
th
eir
f
i
n
d
in
g
s
,
t
h
e
au
t
h
o
r
s
d
ev
elo
p
e
d
a
MitM
attac
k
d
etec
tio
n
ap
p
r
o
ac
h
b
y
i
d
en
tify
in
g
th
e
s
ig
n
al
ch
ar
ac
ter
is
tics
em
itt
ed
b
y
f
ak
e
ac
ce
s
s
p
o
in
ts
.
T
h
e
y
s
u
cc
ess
f
u
lly
ch
ar
ac
ter
ized
MitM
attac
k
s
o
n
W
i
-
Fi
n
etwo
r
k
s
an
d
s
u
g
g
ested
th
at
ad
d
itio
n
al
s
tep
s
m
ay
b
e
n
e
ce
s
s
ar
y
f
o
r
attac
k
er
s
to
ac
ce
s
s
a
tar
g
et
n
etwo
r
k
,
d
ep
en
d
i
n
g
o
n
its
s
ec
u
r
ity
lev
el.
T
h
e
s
tu
d
y
co
n
clu
d
e
d
th
at
u
n
d
er
s
tan
d
i
n
g
th
ese
attac
k
m
eth
o
d
s
wo
u
ld
aid
i
n
d
ev
elo
p
in
g
an
i
n
tr
u
s
io
n
d
etec
tio
n
s
y
s
tem
(
I
DS)
f
o
c
u
s
in
g
o
n
th
e
OSI
m
o
d
el'
s
p
h
y
s
ical
lay
er
[
1
7
]
.
A
tech
n
ical
p
ap
er
b
y
Gan
g
an
[
1
8
]
d
is
cu
s
s
ed
th
e
b
asics
o
f
MitM
attac
k
s
in
co
m
m
u
n
icatio
n
n
etwo
r
k
s
an
d
th
eir
d
ef
e
n
s
e
s
tr
ateg
ies.
T
h
e
p
ap
er
h
i
g
h
lig
h
ted
t
h
at
tim
in
g
in
f
o
r
m
atio
n
ca
n
b
e
u
s
ed
to
id
en
tify
attac
k
s
in
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
I
mp
leme
n
ta
tio
n
o
f a
n
etw
o
r
k
in
tr
u
s
io
n
d
etec
tio
n
s
ystem
fo
r
…
(
K
en
n
ed
y
Oko
kp
u
jie
)
6035
v
ar
io
u
s
r
ea
l
-
tim
e
co
m
m
u
n
icatio
n
s
ce
n
ar
io
s
.
T
h
e
s
tu
d
y
also
p
o
in
ted
o
u
t
th
at
DNS
s
p
o
o
f
in
g
,
s
ess
io
n
h
ijack
in
g
,
SS
L
h
ijack
in
g
,
an
d
AR
P
ca
ch
e
p
o
is
o
n
in
g
ar
e
co
m
m
o
n
ca
u
s
es
o
f
MitM
attac
k
s
.
Mit
M
attac
k
s
ap
p
ly
to
q
u
an
tu
m
cr
y
p
to
g
r
ap
h
ic
s
y
s
tem
s
an
d
p
ee
r
-
to
-
p
ee
r
(
P2
P)
n
e
two
r
k
s
.
T
h
e
p
a
p
er
e
m
p
h
asize
d
th
at
MitM
attac
k
s
ar
e
a
s
im
p
le
m
eth
o
d
o
f
co
m
p
r
o
m
is
in
g
q
u
a
n
tu
m
cr
y
p
to
g
r
a
p
h
y
s
y
s
tem
s
,
esp
ec
ially
if
s
e
cu
r
ity
m
ea
s
u
r
es
ar
e
in
s
u
f
f
icien
t to
v
e
r
if
y
th
e
a
u
th
e
n
ticatio
n
o
f
th
e
two
co
m
m
u
n
ic
atin
g
p
ar
ties
[
1
9
]
,
[
2
0
]
.
T
h
e
s
tu
d
y
s
u
g
g
ested
th
at
AR
P
p
o
is
o
n
in
g
ca
n
b
e
m
itig
ated
u
s
in
g
a
s
h
ell
s
cr
ip
t
th
at
m
o
n
ito
r
s
I
P
a
n
d
MA
C
ad
d
r
ess
es
in
th
e
AR
P
ca
ch
e
tab
le.
Ho
wev
e
r
,
th
e
a
u
th
o
r
n
o
ted
th
at
th
is
m
eth
o
d
i
s
lim
ited
to
L
in
u
x
s
y
s
tem
s
,
an
d
th
e
f
r
eq
u
e
n
t
AR
P
q
u
er
ies
g
en
er
ate
s
u
b
s
tan
tial
n
etwo
r
k
tr
af
f
ic.
T
h
e
p
ap
er
co
n
clu
d
e
d
with
r
ec
o
m
m
en
d
atio
n
s
f
o
r
n
etwo
r
k
s
ec
u
r
ity
m
ea
s
u
r
es,
in
clu
d
in
g
s
ec
u
r
ity
-
f
o
c
u
s
ed
n
etwo
r
k
d
esig
n
,
r
e
g
u
la
r
o
p
er
atin
g
s
y
s
tem
u
p
g
r
ad
es,
f
r
eq
u
en
t
u
p
d
ates
o
f
n
etwo
r
k
d
e
v
ices,
an
d
r
o
u
tin
e
i
n
s
tallatio
n
o
f
s
ec
u
r
ity
p
atch
es
[
1
8
]
,
[
2
1
]
–
[
2
4
]
.
I
n
th
e
jo
u
r
n
al
p
u
b
licatio
n
“
Han
d
lin
g
o
f
m
an
-
in
-
th
e
-
m
id
d
le
attac
k
in
W
SN
th
r
o
u
g
h
in
tr
u
s
io
n
d
etec
tio
n
s
y
s
tem
,
”
Mo
h
ap
atr
a
et
a
l.
[
2
5
]
p
r
o
p
o
s
ed
a
d
ee
p
lear
n
in
g
-
b
ased
MitM
-
in
tr
u
s
io
n
d
etec
tio
n
s
y
s
tem
(
MI
T
M
-
I
DS)
f
o
r
attac
k
d
etec
t
io
n
,
is
o
latio
n
,
an
d
n
o
d
e
r
ec
o
n
f
ig
u
r
atio
n
.
T
h
e
m
et
h
o
d
tr
ain
e
d
n
o
d
es to
r
ec
o
g
n
ize
p
o
ten
tial
th
r
ea
ts
an
d
d
em
o
n
s
tr
ated
an
8
9
.
1
4
7
%
attac
k
d
ete
ctio
n
r
ate
in
s
im
u
latio
n
s
.
T
h
e
s
tu
d
y
'
s
g
o
al
wa
s
to
d
ev
elo
p
an
attac
k
-
to
ler
an
t
I
DS.
B
y
ev
alu
atin
g
th
r
o
u
g
h
p
u
t
an
d
p
ac
k
et
lo
s
s
,
th
e
au
t
h
o
r
s
v
alid
ate
d
th
e
ef
f
ec
tiv
en
ess
o
f
th
eir
p
r
o
p
o
s
ed
m
o
d
el.
Pack
et
lo
s
s
was
d
ef
in
ed
as
th
e
f
ailu
r
e
o
f
a
p
ac
k
et
to
r
ea
ch
its
d
esti
n
atio
n
,
wh
ile
t
h
r
o
u
g
h
p
u
t
was
th
e
s
u
cc
ess
f
u
l
t
r
an
s
m
is
s
io
n
o
f
p
ac
k
ets
with
in
a
s
et
tim
e.
T
h
e
f
in
d
i
n
g
s
r
ev
ea
led
lo
w
p
ac
k
et
lo
s
s
an
d
h
ig
h
th
r
o
u
g
h
p
u
t,
s
u
p
p
o
r
tin
g
th
e
au
th
o
r
s
'
claim
o
f
h
av
in
g
d
ev
elo
p
e
d
a
r
o
b
u
s
t
n
etwo
r
k
in
f
r
astru
ctu
r
e.
3.
M
E
T
H
O
D
T
h
is
s
ec
tio
n
d
is
cu
s
s
es
th
e
co
n
ce
p
tu
al
f
r
a
m
ewo
r
k
o
f
th
e
s
y
s
tem
d
ev
elo
p
e
d
in
th
is
wo
r
k
an
d
t
h
e
m
eth
o
d
s
an
d
p
r
o
ce
s
s
es
f
o
r
im
p
lem
en
tin
g
th
e
NI
DS
d
ev
e
lo
p
ed
in
th
is
p
ap
er
.
T
h
e
s
y
s
tem
im
p
lem
en
ts
a
n
etwo
r
k
in
tr
u
s
io
n
d
etec
tio
n
s
y
s
tem
u
s
in
g
B
ash
s
cr
ip
tin
g
t
o
d
etec
t
wh
en
an
attac
k
h
as
o
cc
u
r
r
ed
.
Py
th
o
n
s
cr
ip
tin
g
s
en
d
s
em
ail
n
o
tific
at
io
n
s
wh
en
a
MitM
attac
k
is
d
etec
ted
.
T
h
e
e
n
tire
s
y
s
tem
is
r
u
n
as
a
b
ac
k
g
r
o
u
n
d
s
er
v
ice
f
o
r
th
e
n
etwo
r
k
a
d
m
i
n
.
T
h
e
b
l
o
ck
d
iag
r
am
illu
s
tr
ated
in
Fig
u
r
e
9
p
r
esen
ts
an
ab
s
tr
ac
tio
n
o
f
th
e
s
y
s
tem
.
T
h
e
co
n
ce
p
tu
al
f
r
am
ewo
r
k
f
o
r
th
is
wo
r
k
in
v
o
lv
es
th
e
in
ter
ac
tio
n
o
f
t
h
r
ee
h
o
s
ts
with
in
a
n
etwo
r
k
,
id
en
tifie
d
as Ho
s
t A
(
n
etwo
r
k
ad
m
in
is
tr
ato
r
)
,
Ho
s
t B (
Victim
)
,
an
d
Ho
s
t C (
Attack
er
)
.
Fig
u
r
e
9
.
B
lo
ck
d
iag
r
am
o
f
th
e
s
y
s
tem
T
h
e
f
r
am
ewo
r
k
d
em
o
n
s
tr
ates
h
o
w
th
e
AR
P
o
p
er
ates
in
t
h
e
n
etwo
r
k
an
d
h
o
w
th
e
attac
k
er
ca
n
co
n
d
u
ct
an
AR
P
s
p
o
o
f
in
g
att
ac
k
to
in
ter
ce
p
t
co
m
m
u
n
icatio
n
s
b
etwe
en
th
e
v
ictim
an
d
t
h
e
r
o
u
ter
.
Ho
s
t
B
in
itiates
th
e
co
m
m
u
n
icatio
n
b
y
s
en
d
in
g
an
AR
P
r
eq
u
est
to
d
eter
m
in
e
th
e
MA
C
ad
d
r
ess
ass
o
ciate
d
with
th
e
r
o
u
ter
'
s
I
P
ad
d
r
ess
(
1
9
2
.
1
6
8
.
0
.
1
)
.
T
h
is
r
eq
u
est
is
b
r
o
ad
ca
s
ted
th
r
o
u
g
h
o
u
t
th
e
n
etwo
r
k
,
en
ca
p
s
u
lated
in
a
f
r
am
e
th
at
in
clu
d
es
d
etails
s
u
ch
as
Ho
s
t
B
's
I
P
ad
d
r
ess
(
1
9
2
.
1
6
8
.
0
.
3
)
a
n
d
MA
C
ad
d
r
ess
(
0
6
:0
9
:0
8
)
.
T
h
e
r
o
u
ter
r
ec
eiv
es
th
e
AR
P
r
eq
u
est,
v
er
if
ies
th
e
m
atch
in
g
I
P
ad
d
r
ess
,
an
d
r
esp
o
n
d
s
with
an
AR
P
r
ep
ly
.
T
h
is
r
ep
ly
p
r
o
v
i
d
es
th
e
r
o
u
ter
'
s
MA
C
ad
d
r
ess
(
0
0
:1
5
:1
8
)
to
Ho
s
t
B
,
wh
ich
is
th
en
s
to
r
ed
in
its
AR
P
ca
ch
e,
lin
k
in
g
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
6
,
Dec
em
b
e
r
20
25
:
6
0
2
7
-
6
0
4
2
6036
th
e
r
o
u
ter
'
s
I
P
ad
d
r
ess
to
its
MA
C
ad
d
r
ess
.
An
AR
P
s
p
o
o
f
in
g
attac
k
is
ca
r
r
ied
o
u
t
b
y
Ho
s
t
C
(
th
e
attac
k
er
)
b
y
cr
ea
tin
g
a
f
r
au
d
u
len
t
AR
P
r
ep
ly
,
f
alsely
claim
in
g
th
e
I
P
ad
d
r
ess
1
9
2
.
1
6
8
.
0
.
1
(
th
e
r
o
u
ter
'
s
ad
d
r
ess
)
b
u
t
ass
o
ciatin
g
it
with
th
e
attac
k
e
r
'
s
MA
C
ad
d
r
ess
(
0
0
:1
2
:3
4
)
.
T
h
is
s
p
o
o
f
ed
AR
P
r
ep
ly
is
s
e
n
t
to
Ho
s
t
B
,
wh
ic
h
s
u
b
s
eq
u
en
tly
u
p
d
ates
its
AR
P
ca
ch
e,
e
r
r
o
n
eo
u
s
ly
lin
k
in
g
th
e
r
o
u
ter
'
s
I
P
ad
d
r
ess
to
th
e
attac
k
er
'
s
MA
C
ad
d
r
ess
.
Du
e
t
o
th
e
attac
k
,
Ho
s
t
B
'
s
AR
P
ca
ch
e
is
p
o
is
o
n
ed
,
r
esu
ltin
g
in
f
u
tu
r
e
p
ac
k
ets
in
te
n
d
ed
f
o
r
th
e
r
o
u
ter
b
ein
g
r
ed
ir
ec
ted
to
th
e
attac
k
er
(
H
o
s
t
C
)
in
s
tead
.
T
h
is
en
ab
les
th
e
attac
k
er
to
i
n
ter
ce
p
t,
m
o
d
if
y
,
an
d
r
etr
an
s
m
it th
e
d
ata.
Fig
u
r
e
1
0
s
h
o
ws
th
e
AR
P
s
p
o
o
f
in
g
d
etec
tio
n
f
lo
wch
ar
t.
A
B
ash
s
cr
ip
t
o
n
Kali
L
in
u
x
is
d
ep
lo
y
ed
o
n
Ho
s
t
A,
an
d
th
is
s
cr
ip
t
s
er
v
es
as
th
e
I
DS.
T
h
is
s
cr
ip
t
p
er
io
d
ically
ch
ec
k
s
th
e
MA
C
ad
d
r
ess
as
s
o
ciate
d
with
th
e
r
o
u
ter
'
s
I
P
ad
d
r
ess
b
y
q
u
er
y
in
g
th
e
AR
P
tab
le.
I
f
a
d
is
cr
ep
an
cy
in
d
icate
s
a
p
o
te
n
tial
AR
P
s
p
o
o
f
in
g
attac
k
,
th
e
s
cr
ip
t
lo
g
s
th
e
ev
e
n
t
an
d
t
r
ig
g
er
s
an
aler
t.
W
h
en
an
atta
ck
is
d
etec
ted
,
a
Py
th
o
n
s
cr
ip
t
is
in
teg
r
ated
with
th
e
I
DS
to
s
en
d
e
m
ail
n
o
tific
atio
n
s
v
ia
s
im
p
le
m
ail
tr
an
s
f
er
p
r
o
to
co
l
(
SMT
P).
T
h
e
I
D
S
is
au
to
m
ated
as
a
b
ac
k
g
r
o
u
n
d
s
er
v
ice,
co
n
tin
u
o
u
s
ly
m
o
n
ito
r
in
g
th
e
n
etwo
r
k
to
d
etec
t
an
d
r
esp
o
n
d
to
AR
P
s
p
o
o
f
in
g
attac
k
s
.
Fig
u
r
e
1
1
i
llu
s
tr
ates
th
e
in
ter
ac
tio
n
s
b
etwe
en
th
e
h
o
s
ts
an
d
th
e
r
o
u
ter
,
d
ep
ictin
g
t
h
e
f
lo
w
o
f
AR
P
r
eq
u
ests
,
r
ep
lies
,
an
d
th
e
s
u
b
s
eq
u
en
t sp
o
o
f
in
g
attac
k
.
Fig
u
r
e
1
0
.
AR
P sp
o
o
f
in
g
d
ete
ctio
n
p
r
o
ce
s
s
Fig
u
r
e
1
1
.
C
o
n
ce
p
tu
al
f
r
am
ew
o
r
k
o
f
th
e
s
y
s
tem
Evaluation Warning : The document was created with Spire.PDF for Python.