A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is application/pdf
.
Filters
Firewall fingerprinting
2012
2012 Proceedings IEEE INFOCOM
In this paper, we study firewall fingerprinting, in which one can use firewall decisions on TCP packets with unusual flags and machine learning techniques for inferring firewall implementation. ...
Firewalls are critical security devices handling all traffic in and out of a network. ...
Hence, such approaches cannot be effective for firewall fingerprinting.
C. Technical Challenges Firewall fingerprinting has two major technical challenges. ...
doi:10.1109/infcom.2012.6195544
dblp:conf/infocom/KhakpourHGLPW12
fatcat:stqb7cnvtffb7omkv7yt6m3dwy
Detection of Firewall Fingerprinting and Vulnerability Prevention by Denial of Attacks on Web Application
2019
IJARCCE
Thus, our proposed system of firewall fingerprinting methods can achieve quite high accuracy against all web vulnerability. Thus, all web applications can be made secure against web attacks. ...
Our proposed system provides efficient fingerprinting methods to prevent the attacks. Also, the proposed system provides security against application as well. ...
the firewall. ...
doi:10.17148/ijarcce.2019.8254
fatcat:azz4f3wjizf4jlspbrh4lmnmfu
Fingerprinting of Host Based Firewalls
unpublished
We will show that it is rather easy to fingerprint all 18 personal firewalls selected in our testbed. ...
We describe two approaches to personal firewall fingerprinting-port state based and time based. Both approaches exploit various inconsistencies between IPv4 and IPv6 ports of certain firewalls. ...
ports, it lacks the capability to fingerprint different firewalls as such. ...
fatcat:j37trukf6jfzviicebhv2lu4e4
IP prefix hijacking detection using the collection of as characteristics
2011
2011 13th Asia-Pacific Network Operations and Management Symposium
In this paper, we present the method of collecting network fingerprints for verifying destination reachability and also propose an IP prefix hijacking detection method using the collected fingerprints. ...
By identifying the characteristics of the destination network such as network fingerprints, we can know whether the traffic reach the correct destination. ...
Network fingerprinting We use the firewall policy of a target network as a network fingerprint. The Internet firewall is deployed at an external point in the network. ...
doi:10.1109/apnoms.2011.6077014
dblp:conf/apnoms/HongHJ11
fatcat:h4fozsom35e5fdpbvbyxviwnny
Misusing TCP Timestamps
2015
Zenodo
The problem, depicted in scenario in figure 1 ,is that multiple systems behind a firewall are NAT-ed to one IP address and thus create an unusable fingerprint. ...
As side note: Don't let nmap fool you -a closed port is a good idea when fingerprinting a host directly. This is not the case anymore when the device is behind a firewall. ...
doi:10.5281/zenodo.3521431
fatcat:faqp5fouavcvdljkeeyo6iknpu
Collusion secure convolutional fingerprinting information codes
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
The main sources of this information include Digital Watermarking, Digital Fingerprinting, and Live Monitoring. ...
This includes firewalls, packet shapers, and Trojan clients. Firewalls can be set up in one of two main "wizard" modes. ...
This works good for company firewalls, since they don't often have to deal with people needing ports open, since only business programs should be running on the inside of the firewall anyway. ...
doi:10.1145/1128817.1128856
dblp:conf/ccs/ZhuZZ06
fatcat:oywgsslfazbqrjjjkof7z6x7sq
Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks
2012
International Journal of Computer Applications
Receiver DEG will calculate fingerprint for the received packet using same secret key, valid fingerprint ensures that it has been produced by DEG. ...
Lack of knowledge about packet fingerprint and about symmetric key for fingerprinting stops an attacker from creating the packets which can accepted by receiver DEG. ...
Data exchange gateway
Register Content filter Software firewall Communicator Kernel hardener ...
doi:10.5120/8224-1661
fatcat:iu3nb6dwobffzn2f5zbwuogmwm
Study of methods for endpoint aware inspection in a next generation firewall
2022
Cybersecurity
For passive endpoint application identification, we study several traffic fingerprinting methods for different protocols. ...
AbstractGiven the global increase in remote work with the COVID-19 pandemic and deperimeterization due to cloud deployment of next generation firewalls, the concept of a next generation firewall is at ...
These solutions are sometimes also referred to as Packet Filter Firewalls or first generation firewalls (Cisco Documentation 2020) . ...
doi:10.1186/s42400-022-00127-8
pmid:36092494
pmcid:PMC9439937
fatcat:nzfg537kqvgazmekfax6niw3p4
Tracing Technique for Blaster Attack
[article]
2009
arXiv
pre-print
This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. ...
The trace is based on the Blaster attack fingerprint which primarily done at personal firewall log. ...
The data can be further analysed by referring to Blaster fingerprint for attacker logs by examine the attacker personal firewall and security log. ...
arXiv:0908.3587v1
fatcat:ia4lxdbb4zgthkmyjedwohiisy
Countermeasure Tool - Carapace for Network Security
2011
International journal of network security and its applications
There are two types of fingerprinting: • Active fingerprinting • Passive fingerprinting Active fingerprinting: we know that different operating systems respond differently to the same kind of ICMP message ...
Passive fingerprinting: like active fingerprinting, passive fingerprinting is based on the fact that different operating systems respond differently to certain type of packets. ...
doi:10.5121/ijnsa.2011.3302
fatcat:33jfhbotezhcnisbwkjbspxhae
Securing traffic at QoS-aware residential gateway using biometric signatures
2008
IEEE transactions on consumer electronics
Novel computational methods are used for face and fingerprint analysis and recognition. ...
bimodal biometric recognition system (BBRS) is implemented via class-based queuing (CBQ) bandwidth management in a 3-PC network including a real DiffServ-capable CBQ-capable router, CCD camera and optical fingerprint ...
CCD camera, fingerprint reader, etc) for access control of home network digital content.
Fig. 2 . 2 Packet processing scenario by DSME via IP firewall. ...
doi:10.1109/tce.2008.4637600
fatcat:fiqdkkvseffz3nmogobks6m4ka
Biometrics Authentication Technique for Intrusion Detection Systems Using Fingerprint Recognition
2012
International Journal of Computer Science Engineering and Information Technology
Then we have given the information regarding the intrusion detection system and finally we have proposed a method which is based on fingerprint recognition which would allow us to detect more efficiently ...
The firewall protects an organization from cruel attacks from the Internet and the Intrusion detection system detects if someone tries to break in through the firewall or manages to break in the firewall ...
Besides, Firewalls do a very good job of filtering incoming traffic from the Internet; however, there are ways to circumvent the firewall. ...
doi:10.5121/ijcseit.2012.2106
fatcat:6uxfpdboe5fyrjwxbr3uqzrpiq
Protocol Scrubbing: Network Security Through Transparent Flow Modification
2004
IEEE/ACM Transactions on Networking
The fingerprint scrubber restricts an attacker's ability to determine the operating system of a protected host. ...
The fingerprint scrubber is built upon the TCP scrubber and removes additional ambiguities from flows that can reveal implementation-specific details about a host's operating system. ...
, firewalls, Web cameras, and even some game consoles. ...
doi:10.1109/tnet.2003.822645
fatcat:b7yzm7viejfbrfjg2tvuusam7e
The Dynamic Honeypot Design and Implementation Based on Honeyd
[chapter]
2011
Communications in Computer and Information Science
At present the main security technologies include firewall technology, intrusion detection technology, access control technology, data encryption technology and so on. ...
Data Control Honeyd usually has two layers of data control, Respectively is a firewall data control and router data control, Firewall data control mainly through a firewall to control the honeypot out ...
Design of the active detection combining with the passive fingerprint ...
doi:10.1007/978-3-642-23321-0_14
fatcat:qfdszeehx5b53kheahgsnmaxvq
A Classification Of analyzed Detection and Improvement OS Fingerprinting and Various finger stamping scanning ports
2018
International Journal for Research in Applied Science and Engineering Technology
More and more analyzed for the fingerprint to use some tools like inactive and active tools. Both tools are identifying remote o/s finger stamping. ...
The main weakness of active OS fingerprinting method is that it cannot do if the target system has firewall and intrusion detection systems (IDSs). ...
It is vital for network executives to do .O/S fingerprinting passively to obtain the elimination of the active method due to Firewalls/IDSs [5] [6] .
A. ...
doi:10.22214/ijraset.2018.1357
fatcat:5wtbg5rjvfe3xbw7aao72qm4tm
« Previous
Showing results 1 — 15 out of 4,373 results