Skip to main content

2020 | OriginalPaper | Buchkapitel

Automatically Determining a Network Reconnaissance Scope Using Passive Scanning Techniques

verfasst von : Stefan Marksteiner, Bernhard Jandl-Scherf, Harald Lernbeiß

Erschienen in: Fourth International Congress on Information and Communication Technology

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The starting point of securing a network is having a concise overview of it. As networks are becoming more and more complex both in general and with the introduction of IoT technology and their topological peculiarities in particular, this is increasingly difficult to achieve. Especially, in cyber-physical environments, such as smart factories, gaining a reliable picture of the network can be, due to intertwining of a vast amount of devices and different protocols, a tedious task. Nevertheless, this work is necessary to conduct security audits, compare documentation with actual conditions or find vulnerabilities using an attacker’s view, for all of which a reliable topology overview is pivotal. For security auditors; however, there might not much information, such as asset management access, be available beforehand, which is why this paper assumes network to audit as a complete black box. The goal is, therefore, to set security auditors in a condition of, without having any a priori knowledge at all, automatically gaining a topology oversight. This paper describes, in the context of a bigger system that uses active scanning to determine the network topology, an approach to automate the first steps of this procedure: passively scanning the network and determining the network’s scope, as well as gaining a valid address to perform the active scanning. This allows for bootstrapping an automatic network discovery process without prior knowledge.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
This way, it can be prevented to assume a remote network (with more than one hop away) as current network.
 
2
3 of which were detected additionally through the still active-passive scanners (represented by the disjunct bubble in Fig. 4). This indicates that the hosts were not online at the very moment of the Nmap scan.
 
3
For instance with nmap -sn -Pn [network_portion]. This ensures traceroutes to be carried out, even when no active host resides in the network to be examined.
 
4
A possibility would be to compare the most distant addresses and, by binary splitting the set, keep comparing until the traceroutes are equal to yield actual subnetworks.
 
Literatur
2.
Zurück zum Zitat Aboba, B., Carlson, J., Cheshire, S.: Detecting Network Attachment in IPv4 (DNAv4). RFC 4436, Internet Engineering Task Force (2006) Aboba, B., Carlson, J., Cheshire, S.: Detecting Network Attachment in IPv4 (DNAv4). RFC 4436, Internet Engineering Task Force (2006)
4.
Zurück zum Zitat Baker, F.: Requirements for IP Version 4 Routers. RFC 1812, Internet Engineering Task Force (1995) Baker, F.: Requirements for IP Version 4 Routers. RFC 1812, Internet Engineering Task Force (1995)
5.
Zurück zum Zitat Bonica, R., Cotton, M., Haberman, B., Vegoda, L.: Updates to the Special-Purpose IP Address Registries. RFC 8190, Internet Engineering Task Force (2017) Bonica, R., Cotton, M., Haberman, B., Vegoda, L.: Updates to the Special-Purpose IP Address Registries. RFC 8190, Internet Engineering Task Force (2017)
6.
Zurück zum Zitat Braden, R.: Requirements for Internet Hosts—Communication Layers. RFC 1122, Internet Engineering Task Force (1989) Braden, R.: Requirements for Internet Hosts—Communication Layers. RFC 1122, Internet Engineering Task Force (1989)
7.
Zurück zum Zitat Cheshire, S., Aboba, B., Guttman, E.: Dynamic Configuration of IPv4 Link-Local Addresses. RFC 3927, Internet Engineering Task Force (2005) Cheshire, S., Aboba, B., Guttman, E.: Dynamic Configuration of IPv4 Link-Local Addresses. RFC 3927, Internet Engineering Task Force (2005)
8.
Zurück zum Zitat Droms, R.: Dynamic Host Configuration Protocol. RFC 2131, Internet Engineering Task Force (1997) Droms, R.: Dynamic Host Configuration Protocol. RFC 2131, Internet Engineering Task Force (1997)
9.
Zurück zum Zitat Eastlake, D.E. (eds.): ICMP Router Discovery Messages. RFC 1256, Internet Engineering Task Force (1991) Eastlake, D.E. (eds.): ICMP Router Discovery Messages. RFC 1256, Internet Engineering Task Force (1991)
10.
Zurück zum Zitat Gont, F., Pignataro, C.: Formally Deprecating Some ICMPv4 Message Types. RFC 6918, Internet Engineering Task Force (2013) Gont, F., Pignataro, C.: Formally Deprecating Some ICMPv4 Message Types. RFC 6918, Internet Engineering Task Force (2013)
12.
Zurück zum Zitat Marksteiner, S., Expósito Jiménez, V.J., Vallant, H., Zeiner, H.: An overview of wireless iot protocol security in the smart home domain. In: Proceedings of 2017 Internet of Things Business Models, Users, and Networks Conference (CTTE), pp. 1–8. IEEE, New York, NY, USA (2017). https://doi.org/10.1109/CTTE.2017.8260940 Marksteiner, S., Expósito Jiménez, V.J., Vallant, H., Zeiner, H.: An overview of wireless iot protocol security in the smart home domain. In: Proceedings of 2017 Internet of Things Business Models, Users, and Networks Conference (CTTE), pp. 1–8. IEEE, New York, NY, USA (2017). https://​doi.​org/​10.​1109/​CTTE.​2017.​8260940
14.
Zurück zum Zitat Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39–53 (2004)CrossRef Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39–53 (2004)CrossRef
15.
Zurück zum Zitat Mogul, J.: Internet Subnets. RFC 917, Internet Engineering Task Force (1984) Mogul, J.: Internet Subnets. RFC 917, Internet Engineering Task Force (1984)
16.
Zurück zum Zitat Mogul, J., Postel, J.: Internet Standard Subnetting Procedure. RFC 950, Internet Engineering Task Force (1985) Mogul, J., Postel, J.: Internet Standard Subnetting Procedure. RFC 950, Internet Engineering Task Force (1985)
17.
Zurück zum Zitat Muelder, C., Ma, K.L., Bartoletti, T.: Interactive visualization for network and port scan detection. In: Recent Advances in Intrusion Detection, pp. 265–283. Springer (2005) Muelder, C., Ma, K.L., Bartoletti, T.: Interactive visualization for network and port scan detection. In: Recent Advances in Intrusion Detection, pp. 265–283. Springer (2005)
19.
Zurück zum Zitat Postel, J.: Internet Control Message Protocol. RFC 792, Internet Engineering Task Force (1981) Postel, J.: Internet Control Message Protocol. RFC 792, Internet Engineering Task Force (1981)
20.
Zurück zum Zitat Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.J., Lear, E.: Address Allocation for Private Internets. RFC 1918, Internet Engineering Task Force (1996) Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.J., Lear, E.: Address Allocation for Private Internets. RFC 1918, Internet Engineering Task Force (1996)
22.
Zurück zum Zitat Straka, K., Manes, G.: Passive detection of nat routers and client counting. In: Olivier, M.S., Shenoi, S. (eds.) Advances in Digital Forensics II, pp. 239–246. Springer, US, Boston, MA (2006)CrossRef Straka, K., Manes, G.: Passive detection of nat routers and client counting. In: Olivier, M.S., Shenoi, S. (eds.) Advances in Digital Forensics II, pp. 239–246. Springer, US, Boston, MA (2006)CrossRef
Metadaten
Titel
Automatically Determining a Network Reconnaissance Scope Using Passive Scanning Techniques
verfasst von
Stefan Marksteiner
Bernhard Jandl-Scherf
Harald Lernbeiß
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-32-9343-4_11

Neuer Inhalt