8002824265

8002824265



Passive operating system fingerprinting using neural networks and induction of decision rules

Bartosz Bielski, Przemysław Klęsk

Szczecin University of Technology,

Faculty of Computer Science and Information Technology

Abstract:

One of the most difficult task for people managing big- or even medium-size Computer network is determining the accurate number ofhosts that are protected. This Information is really helpful for accurately configuring network-based devices such as intrusion detection Systems. Exact knowledge of the operating systems (residing in hosts) can be useful for excluding many alerts that cannot apply to a remote operating system that is being examined. In this context, we consider a classification problem (we try to recognize the class of operating system) w hen some of the characteristics of the system are modified by its user or any other program (e.g. for internet connection tuning). We use neural networks (MLP, RBF) and rule induction techniques. It should be stressed that existing fingerprinting tools get high accuracy results when tested on the “clean" versions of operating systems, but they fail to detect systems with modified TCP/IP parameters.

Keywords:

passive OS fingerprinting, TCP/IP fingerprinting, operating systems recognition, neural networks, induction of decision rules

1. Introduction

Accurate operating system fingerprinting by passive analysis of the network traffic can be used for maintaining a security access policy. This type of policy may list the types of hosts that are allowed and disallowed (for example administrator can disallow really old versions of operating systems which may have serious bugs).

Remote operating systems fingerprinting is the way of determining the operating system of a remote host. It is based on the fact that the the TCP/IP protocol specification does not clearly describe how to use all fields in the TCP and IP header. Due to this fact developers of operating systems implement differently the TCP/IP stack - which can be used for identification. Even versions and patches can be identified, because program-mers are using e.g. other security features in the systems.

Remote operating systems can be identified by three approaches - “just looking”, active and passive fingerprinting. “Just looking” method is really not accurate and may give inadeąuate results, because of the easy way to modify given presented information; active scanning provides detailed information by actively sending packets and passive analysis provides real-time (but usually less detailed) information. Nevertheless, scanning consumes hosts resources and network bandwidth and it requires morę time on



Wyszukiwarka

Podobne podstrony:
Passive operating system fingerprinting using neural networks... 19 too. The multi-stage architectur
17 Passive operating system fmgerprinting using neural networks...3. Passive OS fingerprinting using
Inne rodzaje systemów operacyjnych (2) Systemy sieciowe i rozproszone (ang. network and distributed
Windows Vista Business Overview: Windows Vista Business operating system is designed to meet the nee
Topie 1, DESCRIBE THE OPERATION OF DATA NETWORKS (75 ąuestions)Section 1: Describe the purpose and f
93 results obtained from neural networks. The obtained values of temperatures, times, hard-ness and
Sieciowy system operacyjny • (network operating system, NOS) - system operacyjny, który pozwala wiel
Comparison of no. of infections per 1000 inhabitants in 4 countries nearthe same latitude and using
Sieciowe systemy operacyjne NetWork Operating System (NOS) - oprogramowanie zainstalowane na serwerz
COSIMIR rb COSI MIR® is the 3D simulation system for the PC-based operating systems Windows 95™/98™
f49 1 w Anonymous ftp sile Operating system f ileś
img296 (3) Neuralyst - produkt ten nie jest właściwie programem, lecz jest określany jako NNDS (Neur
Granty Europejskie FP5 Research Training NetWork Projectdama nr csDevelopment and Application of Met
Fig. 5. Initial val-ues and lowcst skin temperatures mcasured on the fingers for all subje
S5003131 8 Experlments with the larger shaft furnace were still unaucceaaful even after using two tu

więcej podobnych podstron