Network protocol system fingerprinting - A formal approach

被引:0
|
作者
Shu, Guoqiang [1 ]
Lee, David [1 ]
机构
[1] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43210 USA
关键词
protocol system; network security; fingerprinting; testing; extended finite state machine; online minimization;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and insight of the protocol system specifications and implementations. Such ad-hoc approaches are inadequate in dealing with large complex protocol systems. In this paper we propose a formal approach for automated protocol system fingerprinting analysis and experiment. Parameterized Extended Finite State Machine is used to model protocol systems, and four categories of fingerprinting problems are formally defined. We propose and analyze algorithms for both active and passive fingerprinting and present our experimental results on Internet protocols. Furthermore, we investigate protection techniques against malicious fingerprinting and discuss the feasibility of two defense schemes, based on the protocol and application scenarios.
引用
收藏
页码:847 / 858
页数:12
相关论文
共 50 条
  • [1] A Formal Methodology for Network Protocol Fingerprinting
    Shu, Guoqiang
    Lee, David
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (11) : 1813 - 1825
  • [2] Network protocol system monitoring - A formal approach with passive testing
    Lee, D
    Chen, DL
    Hao, RB
    Miller, RE
    Wu, JP
    Yin, X
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2006, 14 (02) : 424 - 437
  • [3] A Formal Approach to the Design of Network Protocol
    罗军舟
    顾冠群
    Journal of Southeast University(English Edition), 1996, (02) : 2 - 6
  • [4] A Formal Approach to Robustness Testing of Network Protocol
    Jing, Chuanming
    Wang, Zhiliang
    Yin, Xia
    Wu, Jianping
    NETWORK AND PARALLEL COMPUTING, 2008, 5245 : 24 - +
  • [5] Minutiae: A formal methodology for accurate protocol fingerprinting
    Shu, Guoqiang
    Lee, David
    2007 3RD IEEE WORKSHOP ON SECURE NETWORK PROTOCOLS, 2007, : 25 - 30
  • [6] A Formal Approach to Robustness Testing of Network Protocol with Time Constraints
    Jing, Chuanming
    Yin, Xia
    Wang, Zhiliang
    Wu, Jianping
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2168 - 2174
  • [7] A formal approach to robustness testing of network protocol with time constraints
    Yin, Xia
    Wang, Zhiliang
    Jing, Chuanming
    Wu, Jianping
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (06) : 622 - 632
  • [8] Decentralized tracing protocol for fingerprinting system
    Kuribayashi, Minoru
    Funabiki, Nobuo
    APSIPA TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING, 2019, 8
  • [9] A formal approach to the protocol converter problem
    Avnit, Karin
    D'Silva, Vijay
    Sowmya, Arcot
    Ramesh, S.
    Parameswaran, Sri
    2008 DESIGN, AUTOMATION AND TEST IN EUROPE, VOLS 1-3, 2008, : 252 - +
  • [10] A formal approach to protocol interoperability testing
    Ruibing Hao
    Jianping Wu
    Journal of Computer Science and Technology, 1998, 13 (1) : 79 - 90