2015
DOI: 10.1109/msp.2015.86
|View full text |Cite
|
Sign up to set email alerts
|

Packet Inspection for Unauthorized OS Detection in Enterprises

Abstract: Many recent malware implementations employ virtual machines to carry out malicious activities. ese are hard to detect because antivirus software running in the native OS can't detect virtual machines' system states. An approach that uses TCP SYN packets for OS fi ngerprinting can detect the presence of unauthorized OSs.M any modern malware implementations carry out their activities using virtual machines to escape detection from antivirus so ware running on the host OS. 1 is malware can also be used as part of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…The combination of TTL and window size fields is used to fingerprint devices using operating system vendor-specific values in their implementations for detection. Table 1 lists some commonly used and legacy operating systems and the window size/TTL pairs used for each [26].…”
Section: Device Characterizationmentioning
confidence: 99%
“…The combination of TTL and window size fields is used to fingerprint devices using operating system vendor-specific values in their implementations for detection. Table 1 lists some commonly used and legacy operating systems and the window size/TTL pairs used for each [26].…”
Section: Device Characterizationmentioning
confidence: 99%
“…The device fingerprint is expanded to improve the accuracy of network asset detection and traceability. Tyagi et al 14 proposed an operating system equipment asset detection method based on Euclidean distance, which is used to discover unauthorized abnormal equipment hosts in the system, which shortens the modeling time compared to other complex classifiers. Reference 15 used the C4.5 decision tree model to achieve passive detection of device fingerprints based on TCP/IP protocol stack with a shorter modeling time and higher accuracy, which improves the detection rate of fingerprints that are not accurately matched.…”
Section: Related Workmentioning
confidence: 99%
“…is TCP/IP fingerprints can help people recognize different devices, including honeypots. Some common TCP/IP fingerprints are TCP FIN flag, TCP initial window, and ACK value [30]. After analysis, we finally decided to use average_received_bytes, average_received_ttl, average_received_ack_flags, average_received_push_flags, average_received_syn_flags, average_received_fin_flags, and average_received_window_size as the network-layer feature.…”
Section: Network-layer Featurementioning
confidence: 99%