Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools

12/09/2019
by   Jan Grashöfer, et al.
0

Protocol detection is the process of determining the application layer protocol in the context of network security monitoring, which requires a timely and precise decision to enable protocol-specific deep packet inspection. This task has proven to be complex, as isolated characteristics like port numbers are not sufficient to reliably determine the application layer protocol. Hence, more dynamic detection approaches have been developed. In this paper, we analyze the Dynamic Protocol Detection mechanisms employed by popular and widespread open-source network monitoring tools. We show on the example of HTTP that all analyzed detection mechanisms are vulnerable to evasion attacks, which pose a serious threat to real-world monitoring operations. We find that the underlying fundamental problem of protocol disambiguation is not adequately addressed in two of three monitoring systems that we analyzed. To enable adequate operational decisions, this paper highlights the inherent trade-offs within Dynamic Protocol Detection.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/15/2018

What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS

A number of important real-world protocols including the Transport Layer...
research
06/23/2021

Advancing Protocol Diversity in Network Security Monitoring

With information technology entering new fields and levels of deployment...
research
07/13/2021

A QUIC(K) Way Through Your Firewall?

The QUIC protocol is a new approach to combine encryption and transport ...
research
12/17/2021

Subverting Stateful Firewalls with Protocol States (Extended Version)

We analyzed the generation of protocol header fields in the implementati...
research
12/04/2019

The method of detecting online password attacks based on high-level protocol analysis and clustering techniques

Although there have been many solutions applied, the safety challenges r...
research
02/13/2021

Risk Framework for Bitcoin Custody Operation with the Revault Protocol

Our contributions with this paper are twofold. First, we elucidate the m...
research
05/07/2018

MANETs monitoring with a distributed hybrid architecture

Monitoring techniques have been deeply studied in wired networks using g...

Please sign up or login with your details

Forgot password? Click here to reset