ONIS: Inferring TCP/IP-based Trust Relationships Completely Off-Path

被引:0
作者
Zhang, Xu [1 ]
Knockel, Jeffrey [1 ]
Crandall, Jedidiah R. [1 ]
机构
[1] Univ New Mexico, Dept Comp Sci, Albuquerque, NM 87131 USA
来源
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018) | 2018年
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present ONIS, a new scanning technique that can perform network measurements such as: inferring TCP/IP-based trust relationships off-path, stealthily port scanning a target without using the scanner's IP address, detecting off-path packet drops between two international hosts. These tasks typically rely on a core technique called the idle scan, which is a special kind of port scan that appears to come from a third machine called a zombie. The scanner learns the target's status from the zombie by using its TCP/IP side channels. Unfortunately, the idle scan assumes that the zombie has IP identifiers (IPIDs) which exhibit the now-discouraged behavior of being globally incrementing. The use of this kind of IPID counter is becoming increasingly rare in practice. Our technique, unlike the idle scan, is based on a much more advanced IPID generation scheme, that of the prevalent Linux kernel. Although Linux's IPID generation scheme is specifically intended to reduce information flow, we show that using Linux machines as zombies in an indirect scan is still possible. ONIS has 87% accuracy, which is comparable to nmap's implementation of the idle scan at 86%. ONIS's much broader choice of zombies will enable it to be a widely used technique which can fulfill various network measurement tasks.
引用
收藏
页码:2078 / 2086
页数:9
相关论文
共 38 条
  • [31] Qian Z., 2012, Proceedings of the 2012 ACM conference on Computer and communications security, P593
  • [32] Off-Path TCP Sequence Number Inference Attack How Firewall Middleboxes Reduce Security
    Qian, Zhiyun
    Mao, Z. Morley
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 347 - 361
  • [33] Quach Alan, 2017, P ACM SIGMETRICS
  • [34] RFC, 1981, Internet Protocol
  • [35] Detection of TCP SYN Scanning using Packet Counts and Neural Network
    Soniya, B.
    Wiscy, M.
    [J]. SITIS 2008: 4TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY AND INTERNET BASED SYSTEMS, PROCEEDINGS, 2008, : 646 - +
  • [36] Staniford S., 2002, Journal of Computer Security, V10, P105
  • [37] A Network Activity Classification Schema and Its Application to Scan Detection
    Treurniet, Joanne
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (05) : 1396 - 1404
  • [38] Xu Zhang, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P720, DOI 10.1109/INFOCOM.2015.7218441