Firewall policy reconnaissance: Techniques and analysis

  • Muhammad Qasim Ali
  • , Ehab Al-Shaer
  • , Taghrid Samak

Research output: Contribution to journalArticlepeer-review

19 Scopus citations

Abstract

In the past decade, scanning has been widely used as a reconnaissance technique to gather critical network information to launch a follow up attack. To combat, numerous intrusion detectors have been proposed. However, scanning methodologies have shifted to the next-generation paradigm to be evasive. The next-generation reconnaissance techniques are intelligent and stealthy. These techniques use a low volume packet sequence and intelligent calculation for the victim selection to be more evasive. Previously, we proposed models for firewall policy reconnaissance that are used to set bound for learning accuracy as well as to put minimum requirements on the number of probes. We presented techniques for reconstructing the firewall policy by intelligently choosing the probing packets based on the responses of previous probes. In this paper, we show the statistical analysis of these techniques and discuss their evasiveness along with the improvement. First, we present the previously proposed two techniques followed by the statistical analysis and their evasiveness to current detectors. Based on the statistical analysis, we show that these techniques still exhibit a pattern and thus can be detected. We then develop a hybrid approach to maximize the benefit by combining the two heuristics.

Original languageEnglish
Article number6698376
Pages (from-to)296-308
Number of pages13
JournalIEEE Transactions on Information Forensics and Security
Volume9
Issue number2
DOIs
StatePublished - Feb 2014
Externally publishedYes

Keywords

  • Security
  • intrusion detection
  • reconnaissance

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Firewall policy reconnaissance: Techniques and analysis'. Together they form a unique fingerprint.

Cite this