Remote Physical Device Fingerprinting Authors: Tadayoshi Kohno, Andre Broido, KC Claffy Presented: IEEE Symposium on Security and Privacy, 2005 Kishore.

Slides:



Advertisements
Similar presentations
Remote Physical Device Fingerprinting Authors Tadayoshi Kohno, Andre Broido, KC Claffy Appears in IEEE Symposium on Security and Privacy, 2005 Presented.
Advertisements

Tadayoshi Kohno: CSE Department, UC San Diego Andre Broido: CAIDA, UC San Diego kc claffy: CAIDA, UC San Diego 2005 IEEE Symposium on Security and Privacy.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
HIERARCHY REFERENCING TIME SYNCHRONIZATION PROTOCOL Prepared by : Sunny Kr. Lohani, Roll – 16 Sem – 7, Dept. of Comp. Sc. & Engg.
Dead Reckoning Objectives – –Understand what is meant by the term dead reckoning. –Realize the two major components of a dead reckoning protocol. –Be capable.
A correlation method for establishing provenance of timestamps in digital evidence By: Bradley Schatz*, George Mohay, Andrew Clark From: Information Security.
Distributed Systems Fall 2010 Time and synchronization.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Available bandwidth measurement as simple as running wget D. Antoniades, M. Athanatos, A. Papadogiannakis, P. Markatos Institute of Computer Science (ICS),
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 13th Lecture Christian Schindelhauer.
Cyclone Time Technology Deriving Consistent Time Base Using Local Clock Information Ashok Agrawala Moustafa Youssef Bao Trinh University of Maryland College.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
ICMP: Ping and Trace CCNA 1 version 3.0 Rick Graziani Spring 2005.
Bandwidth Estimation: Metrics Mesurement Techniques and Tools By Ravi Prasad, Constantinos Dovrolis, Margaret Murray and Kc Claffy IEEE Network, Nov/Dec.
Gursharan Singh Tatla Transport Layer 16-May
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Is Apple’s iMac Operating System Secure under flooding Attacks? by aditya chintala.
Port Scanning.
1 Physical Clocks need for time in distributed systems physical clocks and their problems synchronizing physical clocks u coordinated universal time (UTC)
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Presentation on Osi & TCP/IP MODEL
Exploring the Packet Delivery Process Chapter
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Unicast Routing Protocols  A routing protocol is a combination of rules and procedures that lets routers in the internet inform each other of changes.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
Final Introduction ---- Web Security, DDoS, others
© 2002, Cisco Systems, Inc. All rights reserved..
1 Next Few Classes Networking basics Protection & Security.
FiG: Automatic Fingerprint Generation Shobha Venkataraman Joint work with Juan Caballero, Pongsin Poosankam, Min Gyung Kang, Dawn Song & Avrim Blum Carnegie.
Parallel and Distributed Simulation Synchronizing Wallclock Time.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Outline for Today Objectives: –Time and Timers Administrative details: –Talk on learning at 4 in 130 North Building –Questions?
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Remote Hardware Fingerprinting: A Statistical Approach R. Fink ~ May, 2006.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
Time This powerpoint presentation has been adapted from: 1) sApr20.ppt.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G Connect on demand Feature.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
DoS/DDoS attack and defense
CfE Advanced Higher Physics
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
1 Connectivity with ARP and RARP. 2 There needs to be a mapping between the layer 2 and layer 3 addresses (i.e. IP to Ethernet). Mapping should be dynamic.
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
Global Clock Synchronization in Sensor Networks Qun Li, Member, IEEE, and Daniela Rus, Member, IEEE IEEE Transactions on Computers 2006 Chien-Ku Lai.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
CHARACTERIZING CLOUD COMPUTING HARDWARE RELIABILITY Authors: Kashi Venkatesh Vishwanath ; Nachiappan Nagappan Presented By: Vibhuti Dhiman.
Inferring Internet Denial-of-Service Activity Authors: David Moore, Geoffrey M. Voelker and Stefan Savage; University of California, San Diego Publish:
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
OS Fingerprinting and Tethering Detection in Mobile Networks
IP: Addressing, ARP, Routing
Port Scanning James Tate II
Infrastructure II NTP.
De-anonymizing the Internet Using Unreliable IDs By Yinglian Xie, Fang Yu, and Martín Abadi Presented by Peng Cheng 03/22/2017.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Lecture 2: Overview of TCP/IP protocol
Chapter-5 Traffic Engineering.
Overview: Chapter 4 Infrastructure Establishment
Presentation transcript:

Remote Physical Device Fingerprinting Authors: Tadayoshi Kohno, Andre Broido, KC Claffy Presented: IEEE Symposium on Security and Privacy, 2005 Kishore Padma Raju

OUTLINE 1. Introduction and Prerequisites 2. Techniques 3. Investigations 4. Applications 5. Conclusion 6.Strengths and Weaknesses

Introduction and Prerequisites Fingerprinting – Fingerprinter – fingerprintee There are a number of reliable techniques for remote operating system fingerprinting – nmap – Xprobe One step further: remotely fingerprint a physical device without that device's known cooperation

Introduction and Prerequisites Three different techniques – Active fingerprinting Fingerprinter initiates the connection – Semi passive After fingerprintee initiates the connection fingerprinter interacts – Passive Observes traffic from fingerprintee

Introduction and Prerequisites Parameter(microscopic deviations in device) – Clock skew A standard clock circuit uses crystal oscillator, similar to any modern wristwatch, some amount of imprecision and thus exhibit drift over time. – offset = time reported – true time Clock skew – S = d Offset(t) / dt Measured in PPM(μs/s)

Introduction and Prerequisites How much skew? – +/- 4 seconds a day common – (25 minutes a year) Importantly, paper argues skew of a device is (generally) consistent and distinctive to that device – Thus can use as a fingerprint for this device 24 hours later

OUTLINE 1. Introduction and Prerequisites 2. Techniques – Exploiting the TCP TSopt (passive) – The semi-passive technique – Exploiting ICMP Timestamp Requests (active) 3. Investigations 4. Applications 5. Conclusion 6.Strengths and Weaknesses

Exploiting the TCP TSopt TSopt – 32-bit timestamp contained in each packet – clock that is “at least approximately proportional to real time” – Usually reset to zero upon reboot – Usually not affected by changes to the device's system clock

Exploiting the TCP TSopt The measurer – any entity capable of observing TCP packets from the fingerprintee Create a trace of TCP packets from fingerprintee For each packet plot a point – X value: Amount of actual time passed between reception of first packet in trace and the current packet – Y value: The offset observed for this packet, based on timestamp

TSopt clock skew estimates for two sources from a OC-48 link of a US Tier 1 ISP over a two hour period.

Exploiting the TCP TSopt Use linear programming to determine the equation of the line y = αx + β that best upper- bounds this set of points – α is the estimate of the clock skew – β is an initial observed offset

The semi-passive technique Windows 2000 and XP machines do not set timestamp flag in their initial SYN packets RFC 1323 mandates that none of the following TCP packets in the connection can include timestamp Thus, previous approach will not work if a Windows machine is behind NAT, firewall

The semi-passive technique Paper’s trick: The measurer includes timestamp in the responding SYN/ACK packet Windows machines then include timestamp in all subsequent packets of this connection SYN SYN, TSopt

ICMP Timestamps Reports value of system clock (milliseconds past midnight) RFC 792 requires frequency is 1000 Hz (1 ms resolution) If system clock is updated via NTP regularly, will be relatively accurate – However, most hosts do so infrequently

Exloiting ICMP Timestamp Requests (Active Approach) The measurer: entity capable of sending ICMP Timestamp Request and storing the fingerprintee's subsequent ICMP Timestamp Reply messages Limitation: Fingerprintee must not be behind a firewall that filters ICMP Estimation of clock skew is similar to that in TSopt methods.

QUESTIONS CLOCK SKEW What is the distribution of clock skews among devices? How stable are these clock skews over time? Can these clock skews be measured accurately, independent of network topology and access technology?

OUTLINE 1. Introduction and Prerequisites 2. Techniques 3. Investigations – Distribution of clock skews – Stability of clock skews – Independence of access technology and topology – Independence of distance and of measurer – Effects of OS, NTP and other features 4. Applications 5. Conclusion 6.Strengths and Weaknesses

Distribution of clock skews-Experiment 1 Figure 1: Histogram of TSopt clock skew estimates for sources in a 2 hour network trace from a OC-48 link of a US Tier 1 ISP. (Considered only sources that sent packet over a period of at least 50 minutes per hour, and sent at least 2000 packets per hour.)

Distribution of clock skews Could this skew simply reflect different operating system and hardware configurations? To answer this, TSopt clock offsets were measured for 69 Pentium II machines running Windows XP SP1 over 38 days 48 TCP packets with timestamp per hour

Distribution of clock skews - Experiment 2

Stability of Clock Skews Use the traces from Experiment 2: – divided them into 12- and 24- hour periods – compared all periods of same length for each machine Differences between maximum and minimum clock skew estimated for one machine: – 12-hour periods: 1.29 – 7.33 ppm – 24-hour periods: 0.00 – 4.05 ppm Clock skews are rather constant over time – Other experiments with modern processors support this observation

Independence of Access Technology Experiment 3: Connected laptop at different locations via multiple access technologies to the internet The measurer host1 remained the same and was synchronized via NTP laptop was not synchronized via NTP Skew estimates all within a fraction of a ppm of each other:

Independence of Network Topology Experiment 4: 10 PlanetLab machines in USA, Canada, Switzerland, India and Singapore with approximately accurate system times Laptop again as fingerprintee Skew estimates all within 0.4 ppm of each other (except IIT, India, with additional 1.2 ppm)

Effects of OS and other features Start timeOperating System NTPskew estimate (TCP tstamps) skew estimate (ICMP tstamps) , 12:00 PDT , 08:00 PDT , 21:00 PDT , 21:00 PDT Red Hat 9.0 Windows XP SP2 NO YES NO YES ppm ppm ppm ppm ppm ppm ppm 1.69 ppm

Applications Distinguish virtual honeynets from real networks and virtual hosts from real ones Counting the number of devices behind a Firewall Forensics – eg. argue that a given device was not involved in a recorded event Tracking individual devices (with some probability)

Strengths Shows that it is possible to extract relevant security information from data considered noise Approach could be used with any other protocols that leak information about a device’s clock

Weaknesses Further experimentation required – Laptop running Windows XP SP2 has a noticeably different TSopt clock skew after switching to battery power – Newer processors throttle their speeds based on temperature and load, affects voltage from power supply Easy to circumvent particular methods – echo 0 > /proc/sys/net/ipv4/tcp_timestamps – Randomize TSopt timestamp – Filter ICMP timestamp

Improvements Utilization of approach with other protocols that leak information about a device’s clock Use of profiling in combination with skew data – Skew is within a certain range and machine visits certain websites frequently – OS profiling techniques