Affiliation:
1. Computer science, Goethe-University Frankfurt, Frankfurt am Main, Germany
2. ATHENE National Research Center for Applied Cybersecurity, Darmstadt Germany
3. Cybersecurity Analytics and Defences, Fraunhofer Institute for Secure Information Technology SIT, Darmstadt Germany
Abstract
Network reconnaissance and measurements play a central role in improving Internet security and are important for understanding the current deployments and trends. Such measurements often require coordination with the measured target. This limits the scalability and the coverage of the existing proposals. IP Identification (IPID) provides a side channel for remote measurements without requiring the targets to install agents or visit the measurement infrastructure. However, current IPID-based techniques have technical limitations due to their reliance on the idealistic assumption of stable IPID changes or prior knowledge, making them challenging to adopt for practical measurements.
In this work, we aim to tackle the limitations of existing techniques by introducing a novel approach: predictive analysis of IPID counter behavior. This involves utilizing a machine learning (ML) model to understand the historical patterns of IPID counter changes and predict future IPID values. To validate our approach, we implement six ML models and evaluate them on realistic IPID data collected from 4,698 Internet sources. Our evaluations demonstrate that among the six models, the GP (Gaussian Process) model has superior accuracy in tracking and predicting IPID values.
Using the GP-based predictive analysis, we implement a tool, called ZPredict, to infer various favorable information about target networks or servers. Our evaluation on a large dataset of public servers demonstrates its effectiveness in idle port scanning, measuring Russian censorship, and inferring Source Address Validation (SAV).
Our study methodology is ethical and was developed to mitigate any potential harm, taking into account the concerns associated with measurements.
Publisher
Association for Computing Machinery (ACM)
Reference73 articles.
1. [n. d.]. Rapid7 Labs. https://opendata.rapid7.com/. [Online; accessed 11-Dec-2022].
2. [n. d.]. URL testing lists intended for discovering website censorship. https://github.com/citizenlab/test-lists. [Online; accessed 11-Feb-2022].
3. An Empirical Comparison of Machine Learning Models for Time Series Forecasting
4. Fraunhofer AICOS. 2021. TSFEL Documentation Release 0.1.4. https://tsfel.readthedocs.io/_/downloads/en/development/pdf/. [Online; accessed 2-November-2021].
5. Detecting TCP/IP Connections via IPID Hash Collisions