Network protocol system fingerprinting - A formal approach

被引:0
|
作者
Shu, Guoqiang [1 ]
Lee, David [1 ]
机构
[1] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43210 USA
关键词
protocol system; network security; fingerprinting; testing; extended finite state machine; online minimization;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and insight of the protocol system specifications and implementations. Such ad-hoc approaches are inadequate in dealing with large complex protocol systems. In this paper we propose a formal approach for automated protocol system fingerprinting analysis and experiment. Parameterized Extended Finite State Machine is used to model protocol systems, and four categories of fingerprinting problems are formally defined. We propose and analyze algorithms for both active and passive fingerprinting and present our experimental results on Internet protocols. Furthermore, we investigate protection techniques against malicious fingerprinting and discuss the feasibility of two defense schemes, based on the protocol and application scenarios.
引用
收藏
页码:847 / 858
页数:12
相关论文
共 50 条
  • [21] A Formal Modeling Approach for QOS in MQTT Protocol
    Archana, E.
    Rajeev, Akshay
    Kuruvila, Aby
    Narayankutty, Revathi
    Kannimoola, Jinesh M.
    DATA COMMUNICATION AND NETWORKS, GUCON 2019, 2020, 1049 : 39 - 57
  • [22] Towards a formal system-to-system authentication protocol
    Gritzalis, D
    Katsikas, S
    COMPUTER COMMUNICATIONS, 1996, 19 (12) : 954 - 961
  • [23] A Formal Approach for a Self Organizing Protocol Inspired by Bacteria Colonies: Production System Application
    Mellah, Hakima
    Hassas, Salima
    Drias, Habiba
    Raiah, A.
    Tiguemoumine, A.
    BIOINSPIRED MODELS OF NETWORK, INFORMATION, AND COMPUTING SYSTEMS, 2010, 39 : 185 - +
  • [24] Formal verification of a radio network random access protocol
    Roumane, Ahmed
    Kechar, Bouabdellah
    Kouninef, Belkacem
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (18)
  • [25] Formal analysis of Sensor Network Encryption Protocol (SNEP)
    Tobarra, Llanos
    Cazorla, Diego
    Cuartero, Fernando
    2007 IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1-3, 2007, : 1184 - 1189
  • [26] Formal verification of abstract system and protocol specifications
    Schneider, Axel
    Bluhm, Thomas
    Renner, Tobias
    Heinkel, Ulrich
    Knaeblein, Joachim
    Zavala, Reynaldo
    30TH ANNUAL IEEE/NASA SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2006, : 207 - +
  • [27] Formal specification and verification of the SET/A protocol with an integrated approach
    Lam, VSW
    Padget, J
    CEC 2004: IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY, PROCEEDINGS, 2004, : 229 - 235
  • [28] A formal approach for passive testing of protocol data portions
    Lee, D
    Chen, DL
    Hao, RB
    Miller, RE
    Wu, JP
    Yin, X
    10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, : 122 - 131
  • [29] A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol
    Mauri, Lara
    Cimato, Stelvio
    Damiani, Ernesto
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 52 - 63
  • [30] A Formal Approach To Design Space Exploration Of Protocol Converters
    Avnit, Karin
    Sowmya, Arcot
    DATE: 2009 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, VOLS 1-3, 2009, : 129 - 134