DocumentCode
2014959
Title
Firewall fingerprinting
Author
Khakpour, Amir R. ; Hulst, Joshua W. ; Ge, Zihui ; Liu, Alex X. ; Pei, Dan ; Wang, Jia
Author_Institution
Dept. of Comput. Sci. & Eng., Michigan State Univ., East Lansing, MI, USA
fYear
2012
fDate
25-30 March 2012
Firstpage
1728
Lastpage
1736
Abstract
Firewalls are critical security devices handling all traffic in and out of a network. Firewalls, like other software and hardware network devices, have vulnerabilities, which can be exploited by motivated attackers. However, because firewalls are usually placed in the network such that they are transparent to the end users, it is very hard to identify them and use their corresponding vulnerabilities to attack them. In this paper, we study firewall fingerprinting, in which one can use firewall decisions on TCP packets with unusual flags and machine learning techniques for inferring firewall implementation.
Keywords
authorisation; computer crime; computer network security; fingerprint identification; learning (artificial intelligence); transport protocols; TCP packets; attacker motivation; firewall decisions; firewall fingerprinting; hardware network devices; machine learning techniques; security devices; software network devices; Hardware; IP networks; Indexes; Probes; Sensitivity; Software; Time measurement;
fLanguage
English
Publisher
ieee
Conference_Titel
INFOCOM, 2012 Proceedings IEEE
Conference_Location
Orlando, FL
ISSN
0743-166X
Print_ISBN
978-1-4673-0773-4
Type
conf
DOI
10.1109/INFCOM.2012.6195544
Filename
6195544
Link To Document