Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








4,373 Hits in 1.3 sec

Firewall fingerprinting

Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex X. Liu, Dan Pei, Jia Wang
2012 2012 Proceedings IEEE INFOCOM  
In this paper, we study firewall fingerprinting, in which one can use firewall decisions on TCP packets with unusual flags and machine learning techniques for inferring firewall implementation.  ...  Firewalls are critical security devices handling all traffic in and out of a network.  ...  Hence, such approaches cannot be effective for firewall fingerprinting. C. Technical Challenges Firewall fingerprinting has two major technical challenges.  ... 
doi:10.1109/infcom.2012.6195544 dblp:conf/infocom/KhakpourHGLPW12 fatcat:stqb7cnvtffb7omkv7yt6m3dwy

Detection of Firewall Fingerprinting and Vulnerability Prevention by Denial of Attacks on Web Application

Dilli Babu M, Balamani M, Mukesh G
2019 IJARCCE  
Thus, our proposed system of firewall fingerprinting methods can achieve quite high accuracy against all web vulnerability. Thus, all web applications can be made secure against web attacks.  ...  Our proposed system provides efficient fingerprinting methods to prevent the attacks. Also, the proposed system provides security against application as well.  ...  the firewall.  ... 
doi:10.17148/ijarcce.2019.8254 fatcat:azz4f3wjizf4jlspbrh4lmnmfu

Fingerprinting of Host Based Firewalls

Andrej Šimko
unpublished
We will show that it is rather easy to fingerprint all 18 personal firewalls selected in our testbed.  ...  We describe two approaches to personal firewall fingerprinting-port state based and time based. Both approaches exploit various inconsistencies between IPv4 and IPv6 ports of certain firewalls.  ...  ports, it lacks the capability to fingerprint different firewalls as such.  ... 
fatcat:j37trukf6jfzviicebhv2lu4e4

IP prefix hijacking detection using the collection of as characteristics

Seong-Cheol Hong, James Won-Ki Hong, Hongtaek Ju
2011 2011 13th Asia-Pacific Network Operations and Management Symposium  
In this paper, we present the method of collecting network fingerprints for verifying destination reachability and also propose an IP prefix hijacking detection method using the collected fingerprints.  ...  By identifying the characteristics of the destination network such as network fingerprints, we can know whether the traffic reach the correct destination.  ...  Network fingerprinting We use the firewall policy of a target network as a network fingerprint. The Internet firewall is deployed at an external point in the network.  ... 
doi:10.1109/apnoms.2011.6077014 dblp:conf/apnoms/HongHJ11 fatcat:h4fozsom35e5fdpbvbyxviwnny

Misusing TCP Timestamps

Veit Hailperin
2015 Zenodo  
The problem, depicted in scenario in figure 1 ,is that multiple systems behind a firewall are NAT-ed to one IP address and thus create an unusable fingerprint.  ...  As side note: Don't let nmap fool you -a closed port is a good idea when fingerprinting a host directly. This is not the case anymore when the device is behind a firewall.  ... 
doi:10.5281/zenodo.3521431 fatcat:faqp5fouavcvdljkeeyo6iknpu

Collusion secure convolutional fingerprinting information codes

Yan Zhu, Wei Zou, Xinshan Zhu
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
The main sources of this information include Digital Watermarking, Digital Fingerprinting, and Live Monitoring.  ...  This includes firewalls, packet shapers, and Trojan clients. Firewalls can be set up in one of two main "wizard" modes.  ...  This works good for company firewalls, since they don't often have to deal with people needing ports open, since only business programs should be running on the inside of the firewall anyway.  ... 
doi:10.1145/1128817.1128856 dblp:conf/ccs/ZhuZZ06 fatcat:oywgsslfazbqrjjjkof7z6x7sq

Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks

Abhishek Vora, B. Lakshmi, C. V. Srinivas
2012 International Journal of Computer Applications  
Receiver DEG will calculate fingerprint for the received packet using same secret key, valid fingerprint ensures that it has been produced by DEG.  ...  Lack of knowledge about packet fingerprint and about symmetric key for fingerprinting stops an attacker from creating the packets which can accepted by receiver DEG.  ...  Data exchange gateway Register Content filter Software firewall Communicator Kernel hardener  ... 
doi:10.5120/8224-1661 fatcat:iu3nb6dwobffzn2f5zbwuogmwm

Study of methods for endpoint aware inspection in a next generation firewall

Jenny Heino, Antti Hakkala, Seppo Virtanen
2022 Cybersecurity  
For passive endpoint application identification, we study several traffic fingerprinting methods for different protocols.  ...  AbstractGiven the global increase in remote work with the COVID-19 pandemic and deperimeterization due to cloud deployment of next generation firewalls, the concept of a next generation firewall is at  ...  These solutions are sometimes also referred to as Packet Filter Firewalls or first generation firewalls (Cisco Documentation 2020) .  ... 
doi:10.1186/s42400-022-00127-8 pmid:36092494 pmcid:PMC9439937 fatcat:nzfg537kqvgazmekfax6niw3p4

Tracing Technique for Blaster Attack [article]

Siti Rahayu S., Robiah Y., Shahrin S., Faizal M. A., Mohd Zaki M, Irda R
2009 arXiv   pre-print
This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log.  ...  The trace is based on the Blaster attack fingerprint which primarily done at personal firewall log.  ...  The data can be further analysed by referring to Blaster fingerprint for attacker logs by examine the attacker personal firewall and security log.  ... 
arXiv:0908.3587v1 fatcat:ia4lxdbb4zgthkmyjedwohiisy

Countermeasure Tool - Carapace for Network Security

Anand Bisen, Shrinivas Karwa, B.B Meshram
2011 International journal of network security and its applications  
There are two types of fingerprinting: • Active fingerprinting • Passive fingerprinting Active fingerprinting: we know that different operating systems respond differently to the same kind of ICMP message  ...  Passive fingerprinting: like active fingerprinting, passive fingerprinting is based on the fact that different operating systems respond differently to certain type of packets.  ... 
doi:10.5121/ijnsa.2011.3302 fatcat:33jfhbotezhcnisbwkjbspxhae

Securing traffic at QoS-aware residential gateway using biometric signatures

Pei-Chen Tseng, Jing-Wein Wang, Wen-Shyang Hwang
2008 IEEE transactions on consumer electronics  
Novel computational methods are used for face and fingerprint analysis and recognition.  ...  bimodal biometric recognition system (BBRS) is implemented via class-based queuing (CBQ) bandwidth management in a 3-PC network including a real DiffServ-capable CBQ-capable router, CCD camera and optical fingerprint  ...  CCD camera, fingerprint reader, etc) for access control of home network digital content. Fig. 2 . 2 Packet processing scenario by DSME via IP firewall.  ... 
doi:10.1109/tce.2008.4637600 fatcat:fiqdkkvseffz3nmogobks6m4ka

Biometrics Authentication Technique for Intrusion Detection Systems Using Fingerprint Recognition

Smita S Mudholkar
2012 International Journal of Computer Science Engineering and Information Technology  
Then we have given the information regarding the intrusion detection system and finally we have proposed a method which is based on fingerprint recognition which would allow us to detect more efficiently  ...  The firewall protects an organization from cruel attacks from the Internet and the Intrusion detection system detects if someone tries to break in through the firewall or manages to break in the firewall  ...  Besides, Firewalls do a very good job of filtering incoming traffic from the Internet; however, there are ways to circumvent the firewall.  ... 
doi:10.5121/ijcseit.2012.2106 fatcat:6uxfpdboe5fyrjwxbr3uqzrpiq

Protocol Scrubbing: Network Security Through Transparent Flow Modification

D. Watson, M. Smart, G.R. Malan, F. Jahanian
2004 IEEE/ACM Transactions on Networking  
The fingerprint scrubber restricts an attacker's ability to determine the operating system of a protected host.  ...  The fingerprint scrubber is built upon the TCP scrubber and removes additional ambiguities from flows that can reveal implementation-specific details about a host's operating system.  ...  , firewalls, Web cameras, and even some game consoles.  ... 
doi:10.1109/tnet.2003.822645 fatcat:b7yzm7viejfbrfjg2tvuusam7e

The Dynamic Honeypot Design and Implementation Based on Honeyd [chapter]

Xuewu Liu, Lingyi Peng, Chaoliang Li
2011 Communications in Computer and Information Science  
At present the main security technologies include firewall technology, intrusion detection technology, access control technology, data encryption technology and so on.  ...  Data Control Honeyd usually has two layers of data control, Respectively is a firewall data control and router data control, Firewall data control mainly through a firewall to control the honeypot out  ...  Design of the active detection combining with the passive fingerprint  ... 
doi:10.1007/978-3-642-23321-0_14 fatcat:qfdszeehx5b53kheahgsnmaxvq

A Classification Of analyzed Detection and Improvement OS Fingerprinting and Various finger stamping scanning ports

Nitin Tiwari
2018 International Journal for Research in Applied Science and Engineering Technology  
More and more analyzed for the fingerprint to use some tools like inactive and active tools. Both tools are identifying remote o/s finger stamping.  ...  The main weakness of active OS fingerprinting method is that it cannot do if the target system has firewall and intrusion detection systems (IDSs).  ...  It is vital for network executives to do .O/S fingerprinting passively to obtain the elimination of the active method due to Firewalls/IDSs [5] [6] . A.  ... 
doi:10.22214/ijraset.2018.1357 fatcat:5wtbg5rjvfe3xbw7aao72qm4tm
« Previous Showing results 1 — 15 out of 4,373 results