Remote Hardware Fingerprinting: A Statistical Approach R. Fink ~ May, 2006.

Slides:



Advertisements
Similar presentations
Remote Physical Device Fingerprinting Authors Tadayoshi Kohno, Andre Broido, KC Claffy Appears in IEEE Symposium on Security and Privacy, 2005 Presented.
Advertisements

Tadayoshi Kohno: CSE Department, UC San Diego Andre Broido: CAIDA, UC San Diego kc claffy: CAIDA, UC San Diego 2005 IEEE Symposium on Security and Privacy.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
 WAN uses Serial ports  Ethernet Ports:  Straight through  Cross over.
High Speed Total Order for SAN infrastructure Tal Anker, Danny Dolev, Gregory Greenman, Ilya Shnaiderman School of Engineering and Computer Science The.
Ver 1,12/09/2012Kode :CIJ 340,Jaringan Komputer Lanjut FASILKOM Routing Protocols and Concepts – Chapter 2 Static Routing CCNA.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 5 End-to-End Protocols Copyright © 2010, Elsevier Inc. All rights.
CS3505 The Internet and Info Hiway transport layer protocols : TCP/UDP.
BZUPAGES.COM 1 User Datagram Protocol - UDP RFC 768, Protocol 17 Provides unreliable, connectionless on top of IP Minimal overhead, high performance –No.
Chapter 7 – Transport Layer Protocols
Internetworking Different networks –Different bit rates –Frame lengths –Protocols.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 15th Lecture Christian Schindelhauer.
Source Port # (16)Destination Port # (16) Sequence Number (32 bits) Acknowledgement Number (32 bits) Hdr Len (4) Flags (6)Window Size (16) Options (if.
Service Providers & Data Link & Physical layers Week 4 Lecture 1.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
Internet Technologies Networking / Internet Protocols (TCP/IP) Server/Client Software Communication via Ports Web Page Technology Recipe of Web Page Development.
Hardware & Software Needed For LAN and WAN
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Bandwidth Estimation: Metrics Mesurement Techniques and Tools By Ravi Prasad, Constantinos Dovrolis, Margaret Murray and Kc Claffy IEEE Network, Nov/Dec.
Network Simulation Internet Technologies and Applications.
Correlation & Regression
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 12 Transmission Control Protocol (TCP) Basics.
Active Learning Lecture Slides
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 24 November 11, 2004.
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Adaptive Control-Based Clock Synchronization in Wireless Sensor Networks Kasım Sinan YILDIRIM *, Ruggero CARLI +, Luca SCHENATO + * Department of Computer.
Chapter 7 Low-Level Protocols
Computer Concepts 2014 Chapter 5 Local Area Networks.
IP Forwarding.
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
Connecting The Network Layer to Data Link Layer. ARP in the IP Layer The Address Resolution Protocol (ARP) The Address Resolution Protocol (ARP) Part.
Hour 4 The Internet Layer 1. What You'll Learn in This Hour: IP addresses The IP header ARP ICMP 2.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Transmission Control Protocol
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
Remote Physical Device Fingerprinting Authors: Tadayoshi Kohno, Andre Broido, KC Claffy Presented: IEEE Symposium on Security and Privacy, 2005 Kishore.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Inference for Regression Simple Linear Regression IPS Chapter 10.1 © 2009 W.H. Freeman and Company.
Basic Concepts of Internet Technology What is a computer network? Isolated computers vs. networked computers internetworking The Internet What’s a protocol?
By: M.Nadeem Akhtar1 Data Communication Ch 10. By: M.Nadeem Akhtar2 Networks?  LAN  MAN  WAN.
NAT Network Address Translation. Reading CNI – pp Port Mapping LA – pp NAT.
Cisco Networking Academy S2 C9 TCP/IP. ensure communication across any set of interconnected networks Stack components such as protocols to support file.
Internet Protocol Formats. IP (V4) Packet byte 0 byte1 byte 2 byte 3 data... – up to 65 K including heading info Version IHL Serv. Type Total Length Identifcation.
Routing and Routing Protocols
3.2 Software Fundamentals. A protocol is a formal description of digital message formats and the rules for exchanging those messages in or between computing.
1 LAN – local area network overview: 1.Types of networks 2.Network topology 3.LAN local area networks 4.Introduction to TCP/IP 5.IEEE / Wireless.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Networks and the Internet Topic 3. Three Important Networking Technologies Networks, Internet, WWW.
Global Clock Synchronization in Sensor Networks Qun Li, Member, IEEE, and Daniela Rus, Member, IEEE IEEE Transactions on Computers 2006 Chien-Ku Lai.
Indian Institute of Technology Bombay 1 Communication Networks Prof. D. Manjunath
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Distributed Systems Lecture 5 Time and synchronization 1.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Computer Networks 1000-Transport layer, TCP Gergely Windisch v spring.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer Timing Recovery.
Internet Protocol Formats
Standards Basics.
Routing Protocols and Concepts – Chapter 2
Internet Protocol Formats
Presentation transcript:

Remote Hardware Fingerprinting: A Statistical Approach R. Fink ~ May, 2006

Problem  Identify Specific Machines via Remote Network Fingerprinting Passive Networked Physical properties of the machine  Use to: Identify endpoints in a communication Show that an endpoint participated in a transaction Show that an endpoint did not participate in a transaction  Challenges: What properties? Similar machines? Network delay factors?

 TCP Timestamp Option 32-bit TS Value indicates clock tick, bound to oscillator circuit, crystal Present in most TCP packets by default (all of Linux, Windows can be tricked) Best part: independent of network time server corrections! Timestamps Flags Reser ved Off set Source PortDestination Port Sequence Number Acknowledgement Number Checksum Window Size Urgent Pointer Options + Padding TCPTCP Kind=8Len=10TS Reply (32) TS Value (32)

Approach  Passively collect TS values from observed machine, t o IP address identifies machine during collection phase  Record t o along with measurer system time, t m  Scatter-plot t o versus t m  Fit a regression line to the slope Slope is the clock skew of the observed machine: that is, the amount of drift relative to the measurer per unit time  Group similar drifts to sort out individual machines tmtm toto Clock skew Clock skew B Clock skew C

Previous Research  Kohno, Claffy, Broido 63 Campus Machines 38 days of data (12 hour spans)  Convex Hull Method of Fit  Posed, but did not address: Required sample size Effect of differing topology  Ignored Statistical Techniques ~ Using a convex hull technique, instead of a linear regression technique, throws out the whole body of error analysis theory!

Current Work  Recreated Experiment 4 identical Dell GX-150 machines, one observer Collected initial data on fast switch  Extended the Research Skew via linear regression algorithm Error analysis theory to estimate required number of samples Simulated WAN delay (via Linux Netfilter hacking) in progress Measured PCI bus with frequency counter to verify the physical link to clock skew

Results 1.PCI bus clock speed is directly related to clock skew 2.Linear regression (in LAN case) uniquely identifies machines to within a couple parts per million (ppm) 3.Number of samples required is directly proportional to observed timestamp error and confidence interval, inversely proportional to collection interval and allowed ppm tolerance Validated on repeated population subsets 4.Showed clock skew varies with machine temperature 5.In progress – experiments on WAN data

Summary  Highlights Clock skew is a repeatable way to fingerprint a specific machine Linear regression, a simple machine learning concept, is readily applied Statistical error analysis tells us how much to collect  Lowlights TCP timestamp options are, well, OPTIONAL ~ can just turn them off  Future Research Wireless mobile devices: effect of battery, topology, mobility, clock stepping Other protocol properties, not just timestamps