Network protocol system fingerprinting - A formal approach

被引:0
|
作者
Shu, Guoqiang [1 ]
Lee, David [1 ]
机构
[1] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43210 USA
关键词
protocol system; network security; fingerprinting; testing; extended finite state machine; online minimization;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and insight of the protocol system specifications and implementations. Such ad-hoc approaches are inadequate in dealing with large complex protocol systems. In this paper we propose a formal approach for automated protocol system fingerprinting analysis and experiment. Parameterized Extended Finite State Machine is used to model protocol systems, and four categories of fingerprinting problems are formally defined. We propose and analyze algorithms for both active and passive fingerprinting and present our experimental results on Internet protocols. Furthermore, we investigate protection techniques against malicious fingerprinting and discuss the feasibility of two defense schemes, based on the protocol and application scenarios.
引用
收藏
页码:847 / 858
页数:12
相关论文
共 50 条
  • [31] Efficient Decentralized Tracing Protocol for Fingerprinting System with Index Table
    Kuribayashi, Minoru
    Funabiki, Nobuo
    2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 1595 - 1601
  • [32] Generating network security protocol implementations from formal specifications
    Tobler, Benjamin
    Hutchison, Andrew C. M.
    IFIP Advances in Information and Communication Technology, 2005, 177 : 34 - 53
  • [33] A formal TTCN-based protocol testing for intelligent network
    Kim, S
    Bae, H
    Jun, K
    THIRD IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1998, : 205 - 209
  • [34] A Formal Model of Satellite Communication System Network Control Protocol based on Generalized Stochastic Petri Nets
    Zhu, Jun
    Yang, Qiaoli
    Huang, Wei
    Lu, Ruimin
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 340 - 346
  • [35] Generating network security protocol implementations from formal specifications
    Tobler, B
    Hutchison, ACM
    Certification and Security in Inter-Organizational E-Services, 2005, 177 : 33 - 53
  • [36] The Formal Logical Analysis of the Correctness of the Specifications of Network Protocol SIP
    Kyaw Myat Thu
    Myo Thet Naung
    Ye, Kyaw Zaw
    Devyatkov, V. V.
    2016 UKSIM-AMSS 18TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2016, : 279 - 283
  • [37] Formal-Based Modeling and Analysis of a Network Communication Protocol for IoT: MQTT Protocol
    Hcine, Jamila
    Ben Hafaiedh, Imene
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT'18), VOL.2, 2020, 147 : 350 - 360
  • [38] Formal verification of safety protocol in train control system
    ZHANG Yan1
    2 Railway Technologies Research Centre
    Science China(Technological Sciences) , 2011, (11) : 3078 - 3090
  • [39] Formal Analysis of Streaming Downloading Protocol for System Upgrading
    Zhang, Miaomiao
    Hung, Dang Van
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 164 (03) : 205 - 224
  • [40] Formal verification of safety protocol in train control system
    Zhang Yan
    Tang Tao
    Li KePing
    Mera, Jose Manuel
    Zhu Li
    Zhao Lin
    Xu TianHua
    SCIENCE CHINA-TECHNOLOGICAL SCIENCES, 2011, 54 (11) : 3078 - 3090