Tadayoshi Kohno: CSE Department, UC San Diego Andre Broido: CAIDA, UC San Diego kc claffy: CAIDA, UC San Diego 2005 IEEE Symposium on Security and Privacy.

Slides:



Advertisements
Similar presentations
An Improved TCP for transaction communications on Sensor Networks Tao Yu Tsinghua University 2/8/
Advertisements

Security Issues In Mobile IP
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Doc.: IEEE a Submission May, 2005 Brethour, Time DomainSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Extending Drive-Thru Data Access by Vehicle-to-Vehicle Relay Jing Zhao Todd Arnold Yang Zhang Guohong Cao Pennsylvania State University September 15 th,
New Packet Sampling Technique for Robust Flow Measurements Shigeo Shioda Department of Architecture and Urban Science Graduate School of Engineering, Chiba.
Measurements and Their Uncertainty 3.1
0 - 0.
Overview of Lecture Partitioning Evaluating the Null Hypothesis ANOVA
Lecture 2 ANALYSIS OF VARIANCE: AN INTRODUCTION
SPATor: Improving Tor Bridges with Single Packet Authorization Paper Presentation by Carlos Salazar.
University of Nevada, Reno Router-level Internet Topology Mapping CS790 Presentation Modified from Dr. Gunes slides by Talha OZ.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
The internet. Background Created in 1969, connected computers at UCLA, Stanford Research Institute, U. of Utah, and UC at Santa Barbara With an estimated.
Remote Physical Device Fingerprinting Authors Tadayoshi Kohno, Andre Broido, KC Claffy Appears in IEEE Symposium on Security and Privacy, 2005 Presented.
Lecture 1: Logical, Physical & Casual Time (Part 2) Anish Arora CSE 763.
高度情報化社会を支えるネットワーキング技術 (大阪大学 工学部説明会資料)
The Game of Algebra or The Other Side of Arithmetic The Game of Algebra or The Other Side of Arithmetic © 2007 Herbert I. Gross by Herbert I. Gross & Richard.
3/2003 Rev 1 I – slide 1 of 33 Session I Part I Review of Fundamentals Module 2Basic Physics and Mathematics Used in Radiation Protection.
Author: Chengchen, Bin Liu Publisher: International Conference on Computational Science and Engineering Presenter: Yun-Yan Chang Date: 2012/04/18 1.
Chapter 4 Systems of Linear Equations; Matrices
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
INTRODUCTION TO SIMULATION WITH OMNET++ José Daniel García Sánchez ARCOS Group – University Carlos III of Madrid.
TCP Probe: A TCP with Built-in Path Capacity Estimation Anders Persson, Cesar Marcondes, Ling-Jyh Chen, Li Lao, M. Y. Sanadidi, Mario Gerla Computer Science.
1 Kerberos Anita Jones November, Kerberos * : Objective Assumed environment Assumed environment –Open distributed environment –Wireless and Ethernetted.
Chapter 20 Network Layer: Internet Protocol
IPv4 to IPv6 Network Address Translation. Introduction 4 What is the current internet addressing scheme and what limitations does it face. 4 A new addressing.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I IP ADDRESSING AND SUBNETS Derived From CCNA Network Fundamentals.
Problems and Their Classes
UNIX System Programming Installing OpenSolaris. 2/86 Contents How to setup a virtual machine guest How to install OpenSolaris as a guest How to update.
Test B, 100 Subtraction Facts
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Simple Linear Regression Analysis
Multiple Regression and Model Building
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Delivery and Forwarding of
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Dead Reckoning Objectives – –Understand what is meant by the term dead reckoning. –Realize the two major components of a dead reckoning protocol. –Be capable.
CCNA – Network Fundamentals
A correlation method for establishing provenance of timestamps in digital evidence By: Bradley Schatz*, George Mohay, Andrew Clark From: Information Security.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 13th Lecture Christian Schindelhauer.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Introduction to Honeypot, Botnet, and Security Measurement
IP Forwarding.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
MonNet – a project for network and traffic monitoring Detection of malicious Traffic on Backbone Links via Packet Header Analysis Wolfgang John and Tomas.
Analysis of Internet Backbone Traffic and Header Anomalies Observed Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers.
Remote Physical Device Fingerprinting Authors: Tadayoshi Kohno, Andre Broido, KC Claffy Presented: IEEE Symposium on Security and Privacy, 2005 Kishore.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
Remote Hardware Fingerprinting: A Statistical Approach R. Fink ~ May, 2006.
Time This powerpoint presentation has been adapted from: 1) sApr20.ppt.
D 陳怡安 R 解巽評 R 高榮泰 IEEE/ACM TRANSACTIONS ON NETWORKING OCTOBER 2006 Cristian Estan, George Varghese, Member, IEEE, and Michael Fisk.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Role Of Network IDS in Network Perimeter Defense.
Transport layer identification of P2P traffic Victor Gau Yi-Hsien Wang
Could SP-NAT Save the Internet?
OS Fingerprinting and Tethering Detection in Mobile Networks
Chapter 13 Simple Linear Regression
Port Scanning James Tate II
Infrastructure II NTP.
De-anonymizing the Internet Using Unreliable IDs By Yinglian Xie, Fang Yu, and Martín Abadi Presented by Peng Cheng 03/22/2017.
Intro to Ethical Hacking
Internetworking Outline Best Effort Service Model
Windows Virtual PC / Hyper-V
Presentation transcript:

Tadayoshi Kohno: CSE Department, UC San Diego Andre Broido: CAIDA, UC San Diego kc claffy: CAIDA, UC San Diego 2005 IEEE Symposium on Security and Privacy 1

Introduction Remote operating system fingerprinting – techniques for remotely determining the operating systems of devices on the Internet – E.g Nmap, p0f The author push this idea further and introduce the notion of remote physical device fingerprinting – They accomplish this goal to varying degrees of precision by exploiting microscopic deviations in device hardware: clock skews. 2

Class of Fingerprinting Techniques Passive fingerprinting technique the fingerprinter must be able to observe traffic from the device (the fingerprintee) that the attacker wishes to fingerprint Active fingerprinting technique the fingerprinter must have the ability to initiate connections to the fingerprintee Semi-passive fingerprinting techniques after the fingerprintee initiates a connection, the fingerprinter has the ability to interact with the fingerprintee over that connection 3

Notation A clock C is designed to represent the amount of time that has passed since some initial time i[C]. r[C] – clock Cs resolution, the smallest unit by which the clock can be incremented Hz[C] – the inverse of its resolution R[C](t) – the time reported by clock C at time t, where t denotes the true time Off[c] = R[C](t) – t, A clocks skew, s[C], is the first derivative ( ) of its offset with respect to time 4

The system clock C sys, the devices system clock which is designed to record the amount of time since 00:00:00 UTC, January 1, Although the system clocks on professionally administered machines are often approximately synchronized with true time via NTP (Network Time Protocol, RFC 1305), System clocks on non-professional managed machines are much less to be synchronized. default option when install the system do so only infrequently If an adversary can learn the values of the machines system clock at multiple points in time, the adversary will be able to infer information about the devices system clock skew, s[C sys ]. 5

TCP timestamps options A TCP flow may use TCP time stamps options in the initial SYN packet. If a flow uses the option, then a portion of the header of each TCP packet will contain a 32-bit timestamp. The RFC does not dictate what values the timestamps should take, but does say that the timestamps should be taken from a virtual clock that is at least approximately proportional to real time. We refer this virtual clock as the devices TCP timestamps option clock, or its TSopt clock C tcp 6

TCP timestamps option clock A devices TSopt clock and its system clock are not correlated. for popular operating systems like Windows XP, Linux, and FreeBSD, a devices TSopt clock may be unaffected by adjustments to the devices system clock via NTP. Most systems reset their TSopt clock to zero upon reboot If an adversary can learn the values of a devices TSopt clock at multiple points in time, then the adversary may be able to infer information about the devices TSopt clock skew, s[C tcp ] 7

Key questions to the Fingerprinting technique Q1: How an adversary might obtain samples of a devices TSopt clock at multiple points in time? Q2: How an adversary could use those samples to fingerprint a physical device? 8

The measurer The measurer can be any entity capable of observing TCP packets from the fingerprintee, it could be the fingerprintees ISP, any tap in the middle of the network over which packets from the device travel the author apply techniques to a trace taken on a major Tier 1 ISPs backbone OC-48 links. any system with which the fingerprintee frequently communicates search engine like Google, a news website, a click-through ads service that displays content on a large number of websites. 9

Notation Assume that an adversary has obtained a trace T of TCP packets from the fingerprintee, |T| packets in the trace have the TCP timestamps option enabled. Toward estimating a devices TSopt clock skew s[C tcp ] we adopt the following additional notation. Let t i be the time in seconds at which the measurer observed the i-th packet in T let T i be the C tcp timestamp contained within the i-th packet 10

Notation Define: y i is the observed offset of the i th packet O T is the offset corresponding to the trace T 11

TSopt clock offset-sets for two sources offset-sets for two devices in a two-hour trace of traffic from an Internet backbone OC-48 link on large band corresponds to a device where the TSopt clock has low resolution (r = 100 ms) narrow band corresponds to a device with a higher resolution (r = 10 ms) 12

Clock skew calculation The linear programming solution outputs the equation of a line αx + β that upper-bounds the set of points O T The slope of the line, α, is our estimate of the clock skew of C tcp. 13

Applications (1) Apply the techniques to a honeyd virtual honeynet consisting of 100 virtual Linux hosts and 100 virtualWindows XP SP1 hosts. experiments showed that the TCP flows and ICMP timestamp responses were all handled by a single machine as opposed to 200 different machines Also apply the techniques to a network of five virtual machines running under Vmware Workstation on a single machine. the clock skew estimates of the virtual machines are significantly different from real machines 14

Applications (2) To count the number of hosts behind a NAT Even if the hosts run the same OS for forensics purposes, e.g., to argue whether or not a given laptop was connected to the Internet from a given access location. To help track laptops as they move 15

Comments A novel approach for fingerprinting technique Focus on distinguishing unique physical devices, but not the OS between several machines Accuracy Issues If 2 distinct machines have almost the same clock skew? 16