implement communication protocol security analysis implement sniffer (last step) security analysis code cleanup