Outrepasser les limites des techniques classiques de Prise d'Empreintes grace aux Reseaux de Neurones

06/14/2010
by   Javier Burroni, et al.
0

We present an application of Artificial Intelligence techniques to the field of Information Security. The problem of remote Operating System (OS) Detection, also called OS Fingerprinting, is a crucial step of the penetration testing process, since the attacker (hacker or security professional) needs to know the OS of the target host in order to choose the exploits that he will use. OS Detection is accomplished by passively sniffing network packets and actively sending test packets to the target host, to study specific variations in the host responses revealing information about its operating system. The first fingerprinting implementations were based on the analysis of differences between TCP/IP stack implementations. The next generation focused the analysis on application layer data such as the DCE RPC endpoint information. Even though more information was analyzed, some variation of the "best fit" algorithm was still used to interpret this new information. Our new approach involves an analysis of the composition of the information collected during the OS identification process to identify key elements and their relations. To implement this approach, we have developed tools using Neural Networks and techniques from the field of Statistics. These tools have been successfully integrated in a commercial software (Core Impact).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/09/2010

Using Neural Networks to improve classical Operating System Fingerprinting techniques

We present remote Operating System detection as an inference problem: gi...
research
12/30/2022

An Analysis of Honeypots and their Impact as a Cyber Deception Tactic

This paper explores deploying a cyber honeypot system to learn how cyber...
research
01/13/2010

DCA for Bot Detection

Ensuring the security of computers is a non-trivial task, with many tech...
research
12/17/2021

Subverting Stateful Firewalls with Protocol States (Extended Version)

We analyzed the generation of protocol header fields in the implementati...
research
02/04/2021

FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques

Fuzz Testing techniques are the state of the art in software testing for...
research
10/23/2020

Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX

Since its debut, SGX has been used in many applications, e.g., secure da...
research
12/03/2020

Using Side Channel Information and Artificial Intelligence for Malware Detection

Cybersecurity continues to be a difficult issue for society especially a...

Please sign up or login with your details

Forgot password? Click here to reset