Camouflaging Servers to Avoid Exploits

نویسندگان

  • Morgon Kanter
  • Stephen Taylor
چکیده

The goal of this research is to increase attacker workload by camouflaging servers. Server vulnerabilities are dependent on the specific operating system or server type, version, service pack, and/or patch level. Protocol definitions offer considerable flexibility to developers, and as a result it is possible to fingerprint a particular server by communicating with it using either legitimate or malformed traffic. This fingerprint information provides a roadmap that allows an attacker to select an appropriate exploit and compromise the server. This paper describes a general camouflage capability that presents a false server fingerprint. The capability is implemented as a table-driven finite state machine that operates across the protocol stack, simultaneously falsifying both operating system and service properties. The false fingerprint may be created to provide known vulnerabilities, that if exploited can trigger an alert or honeypot the attacker. The camouflage has been demonstrated by disguising a Microsoft Exchange 2008 server running on Windows Server 2008 RC2 to appear as a Sendmail 8.6.9 server running on Linux 2.6. Both the nmap and Nessus network scanners were deceived into incorrectly identifying the Exchange server. It is important to recognize that camouflage need not be a perfect deception: it is sufficient to sow enough confusion that an attacker is unable to take timely actions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using camouflaging mobility to protect privacy in mobile ad hoc networks

The open nature of wireless medium has left wireless communications vulnerable to various privacy attacks. Much research work has been proposed to protect the identity anonymity of communicating parties, the anonymity of network routes and the location privacy of the message source and destination. However, with the advent of new radio identification and localization techniques, more advanced p...

متن کامل

A CSA Method for Assigning Client to Servers in Online Social Networks

This paper deals with the problem of user-server assignment in online social network systems. Online social network applications such as Facebook, Twitter, or Instagram are built on an infrastructure of servers that enables them to communicate with each other. A key factor that determines the facility of communication between the users and the servers is the Expected Transmission Time (ETT). A ...

متن کامل

Camouflaging in a Complex Environment—Octopuses Use Specific Features of Their Surroundings for Background Matching

Living under intense predation pressure, octopuses evolved an effective and impressive camouflaging ability that exploits features of their surroundings to enable them to "blend in." To achieve such background matching, an animal may use general resemblance and reproduce characteristics of its entire surroundings, or it may imitate a specific object in its immediate environment. Using image ana...

متن کامل

“Putting on My Best Normal”: Social Camouflaging in Adults with Autism Spectrum Conditions

Camouflaging of autistic characteristics in social situations is hypothesised as a common social coping strategy for adults with autism spectrum conditions (ASC). Camouflaging may impact diagnosis, quality of life, and long-term outcomes, but little is known about it. This qualitative study examined camouflaging experiences in 92 adults with ASC, with questions focusing on the nature, motivatio...

متن کامل

Published by the American Museum of Natural History Central Park West a T 79th Street, New Yor

Immature stages of Reduvius personatus (Linnaeus) and some other Reduviidae are known to camouflage themselves with a range of materials found in their environment. Even though this behavior has been observed in several species, camouflaging structures have never been studied in a comparative way. This study documents for the first time the structure that is involved in the application of camou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011