<s>
Network	B-Protocol
eavesdropping	I-Protocol
,	O
also	O
known	O
as	O
eavesdropping	O
attack	O
,	O
sniffing	O
attack	O
,	O
or	O
snooping	B-Protocol
attack	I-Protocol
,	O
is	O
a	O
method	O
that	O
retrieves	O
user	O
information	O
through	O
the	O
internet	O
.	O
</s>
<s>
Research	O
and	O
discussions	O
are	O
brought	O
up	O
in	O
the	O
public	O
's	O
eye	O
,	O
for	O
instance	O
,	O
types	O
of	O
eavesdropping	O
,	O
open-source	B-Application
tools	O
,	O
and	O
commercial	O
tools	O
to	O
prevent	O
eavesdropping	O
.	O
</s>
<s>
Models	O
against	O
network	B-Protocol
eavesdropping	I-Protocol
attempts	O
are	O
built	O
and	O
developed	O
as	O
privacy	O
is	O
increasingly	O
valued	O
.	O
</s>
<s>
Sections	O
on	O
cases	O
of	O
successful	O
network	B-Protocol
eavesdropping	I-Protocol
attempts	O
and	O
its	O
laws	O
and	O
policies	O
in	O
the	O
National	O
Security	O
Agency	O
are	O
mentioned	O
.	O
</s>
<s>
Types	O
of	O
network	B-Protocol
eavesdropping	I-Protocol
include	O
intervening	O
in	O
the	O
process	O
of	O
decryption	O
of	O
messages	O
on	O
communication	O
systems	O
,	O
attempting	O
to	O
access	O
documents	O
stored	O
in	O
a	O
network	O
system	O
,	O
and	O
listening	O
on	O
electronic	O
devices	O
.	O
</s>
<s>
Types	O
include	O
electronic	O
performance	O
monitoring	O
and	O
control	O
systems	O
,	O
keystroke	O
logging	O
,	O
man-in-the-middle	O
attacks	O
,	O
observing	O
exit	B-Application
nodes	I-Application
on	O
a	O
network	O
,	O
and	O
Skype	O
&	O
Type	O
.	O
</s>
<s>
Tor	B-Application
exit	I-Application
nodes	I-Application
are	O
an	O
example	O
.	O
</s>
<s>
Tor	B-Application
is	O
an	O
anonymous	O
communication	O
system	O
that	O
allows	O
users	O
to	O
hide	O
their	O
IP	O
address	O
.	O
</s>
<s>
However	O
,	O
Tor	B-Application
exit	I-Application
nodes	I-Application
are	O
used	O
to	O
eavesdrop	O
at	O
the	O
end	O
of	O
the	O
network	O
traffic	O
.	O
</s>
<s>
The	O
last	O
node	O
in	O
the	O
network	O
path	O
flowing	O
through	O
the	O
traffic	O
,	O
for	O
instance	O
,	O
Tor	B-Application
exit	I-Application
nodes	I-Application
,	O
can	O
acquire	O
original	O
information	O
or	O
messages	O
that	O
were	O
transmitted	O
between	O
different	O
users	O
.	O
</s>
<s>
Computer	O
programs	O
where	O
the	O
source	O
code	O
of	O
the	O
system	O
is	O
shared	O
with	O
the	O
public	O
for	O
free	O
or	O
for	O
commercial	O
use	O
can	O
be	O
used	O
to	O
prevent	O
network	B-Protocol
eavesdropping	I-Protocol
.	O
</s>
<s>
In	O
this	O
case	O
,	O
Advanced	O
Encryption	O
Standard-256	O
,	O
Bro	O
,	O
Chaosreader	O
,	O
CommView	B-Protocol
,	O
Firewalls	B-Application
,	O
Security	O
Agencies	O
,	O
Snort	B-Language
,	O
Tcptrace	B-Protocol
,	O
and	O
Wireshark	B-Language
are	O
tools	O
that	O
address	O
network	O
security	O
and	O
network	B-Protocol
eavesdropping	I-Protocol
.	O
</s>
<s>
The	O
AES-256	B-Algorithm
contains	O
256	O
keys	O
for	O
identifying	O
the	O
actual	O
user	O
,	O
and	O
it	O
represents	O
the	O
standard	O
used	O
for	O
securing	O
many	O
layers	O
on	O
the	O
internet	O
.	O
</s>
<s>
AES-256	B-Algorithm
is	O
used	O
by	O
Zoom	O
Phone	O
apps	O
that	O
help	O
encrypt	O
chat	O
messages	O
sent	O
by	O
Zoom	O
users	O
.	O
</s>
<s>
Bro	O
runs	O
under	O
Digital	O
Unix	O
,	O
FreeBSD	O
,	O
IRIX	O
,	O
SunOS	O
,	O
and	O
Solaris	O
operating	O
systems	O
,	O
with	O
the	O
implementation	O
of	O
approximately	O
22,000	O
lines	O
of	O
C++	B-Language
and	O
1,900	O
lines	O
of	O
Bro	O
.	O
</s>
<s>
Chaosreader	O
is	O
a	O
simplified	O
version	O
of	O
many	O
open-source	B-Application
eavesdropping	O
tools	O
.	O
</s>
<s>
It	O
creates	O
HTML	B-Language
pages	O
on	O
the	O
content	O
of	O
when	O
a	O
network	O
intrusion	O
is	O
detected	O
.	O
</s>
<s>
CommView	B-Protocol
is	O
specific	O
to	O
Windows	O
systems	O
which	O
limits	O
real-world	O
applications	O
because	O
of	O
its	O
specific	O
system	O
usage	O
.	O
</s>
<s>
Firewall	B-Application
technology	O
filters	O
network	O
traffic	O
and	O
blocks	O
malicious	O
users	O
from	O
attacking	O
the	O
network	O
system	O
.	O
</s>
<s>
Having	O
a	O
firewall	B-Application
in	O
the	O
entrance	O
to	O
a	O
network	O
system	O
requires	O
user	O
authentications	O
before	O
allowing	O
actions	O
performed	O
by	O
users	O
.	O
</s>
<s>
There	O
are	O
different	O
types	O
of	O
firewall	B-Application
technologies	O
that	O
can	O
be	O
applied	O
to	O
different	O
types	O
of	O
networks	O
.	O
</s>
<s>
Snort	B-Language
is	O
used	O
in	O
many	O
systems	O
,	O
and	O
it	O
can	O
be	O
run	O
in	O
an	O
offline	O
mode	O
using	O
stream4	O
.	O
</s>
<s>
The	O
snort-reply	O
patch	O
feature	O
is	O
often	O
used	O
to	O
reconstruct	O
executions	O
.	O
</s>
<s>
Tcptrace	B-Protocol
is	O
used	O
to	O
analyze	O
pcap-based	O
network	O
intercepts	O
,	O
which	O
is	O
a	O
packeting	O
capture	O
network	O
application	O
that	O
detects	O
network	O
traffic	O
.	O
</s>
<s>
It	O
has	O
an	O
important	O
feature	O
that	O
monitors	O
eavesdropping	O
attacks	O
and	O
can	O
reconstruct	O
captured	O
TCP	B-Protocol
streams	O
.	O
</s>
<s>
Wireshark	B-Language
,	O
or	O
also	O
named	O
Ethereal	B-Language
,	O
is	O
a	O
widely	O
used	O
open-source	B-Application
eavesdropping	O
tool	O
in	O
the	O
real	O
world	O
.	O
</s>
<s>
Most	O
of	O
the	O
features	O
in	O
Ethereal	B-Language
are	O
packet-oriented	O
and	O
contain	O
a	O
TCP	B-Protocol
reassembly	O
option	O
for	O
experiments	O
on	O
tracking	O
intrusion	O
attempts	O
.	O
</s>
<s>
The	O
information	O
collected	O
from	O
the	O
beacons	O
is	O
then	O
regularly	O
be	O
sent	O
to	O
Tor	B-Application
exit	I-Application
nodes	I-Application
which	O
then	O
the	O
user	O
will	O
be	O
caught	O
in	O
the	O
malicious	O
act	O
.	O
</s>
<s>
The	O
Butterfly	O
encryption	O
scheme	O
uses	O
timestamps	O
and	O
updates	O
pseudorandom	B-Algorithm
number	I-Algorithm
generators	I-Algorithm
(	O
PRNG	O
)	O
seeds	O
in	O
a	O
network	O
system	O
to	O
generate	O
authentication	O
keys	O
and	O
parameters	O
for	O
encrypted	O
messages	O
to	O
be	O
sent	O
out	O
.	O
</s>
<s>
A	O
honey	O
encryption	O
scheme	O
is	O
used	O
to	O
strengthen	O
the	O
protection	O
of	O
private	O
information	O
of	O
instant	O
messaging	O
systems	O
,	O
including	O
WhatsApp	B-Application
and	O
Snapchat	B-Application
,	O
as	O
well	O
as	O
tracking	O
down	O
the	O
eavesdropper	O
’s	O
information	O
.	O
</s>
<s>
The	O
gateway	O
layer	O
manages	O
the	O
packet	B-Application
filtering	I-Application
module	O
.	O
</s>
<s>
A	O
few	O
cases	O
of	O
network	B-Protocol
eavesdropping	I-Protocol
discussed	O
include	O
Alipay	O
and	O
Cloud	B-Architecture
computing	I-Architecture
.	O
</s>
<s>
Cloud	B-Architecture
computing	I-Architecture
is	O
a	O
computing	O
model	O
that	O
provides	O
access	O
to	O
many	O
different	O
configurable	O
resources	O
,	O
including	O
servers	O
,	O
storage	O
,	O
applications	O
,	O
and	O
services	O
.	O
</s>
<s>
Particularly	O
,	O
an	O
attacker	O
can	O
simply	O
identify	O
the	O
data	O
center	O
of	O
the	O
Virtual	O
Machine	O
used	O
by	O
cloud	B-Architecture
computing	I-Architecture
,	O
and	O
retrieve	O
information	O
on	O
the	O
IP	O
address	O
and	O
domain	O
names	O
of	O
the	O
data	O
center	O
.	O
</s>
<s>
It	O
becomes	O
dangerous	O
when	O
the	O
attacker	O
gains	O
access	O
to	O
private	O
cryptographic	O
keys	O
for	O
specific	O
servers	O
which	O
they	O
may	O
get	O
data	O
stored	O
in	B-Architecture
the	I-Architecture
cloud	I-Architecture
.	O
</s>
