ZPredict: ML-Based IPID Side-channel Measurements

IF 4.3 3区 材料科学 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC
Haya Schulmann, Shujie Zhao
{"title":"ZPredict: ML-Based IPID Side-channel Measurements","authors":"Haya Schulmann, Shujie Zhao","doi":"10.1145/3672560","DOIUrl":null,"url":null,"abstract":"<p>Network reconnaissance and measurements play a central role in improving Internet security and are important for understanding the current deployments and trends. Such measurements often require coordination with the measured target. This limits the scalability and the coverage of the existing proposals. IP Identification (IPID) provides a side channel for remote measurements without requiring the targets to install agents or visit the measurement infrastructure. However, current IPID-based techniques have technical limitations due to their reliance on the idealistic assumption of stable IPID changes or prior knowledge, making them challenging to adopt for practical measurements. </p><p>In this work, we aim to tackle the limitations of existing techniques by introducing a novel approach: predictive analysis of IPID counter behavior. This involves utilizing a machine learning (ML) model to understand the historical patterns of IPID counter changes and predict future IPID values. To validate our approach, we implement six ML models and evaluate them on realistic IPID data collected from 4,698 Internet sources. Our evaluations demonstrate that among the six models, the GP (Gaussian Process) model has superior accuracy in tracking and predicting IPID values. </p><p>Using the GP-based predictive analysis, we implement a tool, called ZPredict, to infer various favorable information about target networks or servers. Our evaluation on a large dataset of public servers demonstrates its effectiveness in idle port scanning, measuring Russian censorship, and inferring Source Address Validation (SAV). </p><p>Our study methodology is ethical and was developed to mitigate any potential harm, taking into account the concerns associated with measurements.</p>","PeriodicalId":3,"journal":{"name":"ACS Applied Electronic Materials","volume":null,"pages":null},"PeriodicalIF":4.3000,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACS Applied Electronic Materials","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1145/3672560","RegionNum":3,"RegionCategory":"材料科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Network reconnaissance and measurements play a central role in improving Internet security and are important for understanding the current deployments and trends. Such measurements often require coordination with the measured target. This limits the scalability and the coverage of the existing proposals. IP Identification (IPID) provides a side channel for remote measurements without requiring the targets to install agents or visit the measurement infrastructure. However, current IPID-based techniques have technical limitations due to their reliance on the idealistic assumption of stable IPID changes or prior knowledge, making them challenging to adopt for practical measurements.

In this work, we aim to tackle the limitations of existing techniques by introducing a novel approach: predictive analysis of IPID counter behavior. This involves utilizing a machine learning (ML) model to understand the historical patterns of IPID counter changes and predict future IPID values. To validate our approach, we implement six ML models and evaluate them on realistic IPID data collected from 4,698 Internet sources. Our evaluations demonstrate that among the six models, the GP (Gaussian Process) model has superior accuracy in tracking and predicting IPID values.

Using the GP-based predictive analysis, we implement a tool, called ZPredict, to infer various favorable information about target networks or servers. Our evaluation on a large dataset of public servers demonstrates its effectiveness in idle port scanning, measuring Russian censorship, and inferring Source Address Validation (SAV).

Our study methodology is ethical and was developed to mitigate any potential harm, taking into account the concerns associated with measurements.

ZPredict:基于 ML 的 IPID 侧信道测量
网络侦察和测量在提高互联网安全方面发挥着核心作用,对于了解当前的部署和趋势也非常重要。此类测量通常需要与被测目标进行协调。这限制了现有建议的可扩展性和覆盖范围。IP 识别(IPID)为远程测量提供了一个侧通道,而不需要目标安装代理或访问测量基础设施。然而,目前基于 IPID 的技术存在技术局限性,因为它们依赖于稳定的 IPID 变化或先验知识的理想化假设,这使它们在实际测量中的应用面临挑战。在这项工作中,我们旨在通过引入一种新方法来解决现有技术的局限性:对 IPID 计数器行为进行预测分析。这包括利用机器学习(ML)模型来理解 IPID 计数器变化的历史模式,并预测未来的 IPID 值。为了验证我们的方法,我们实施了六个 ML 模型,并在从 4,698 个互联网来源收集的实际 IPID 数据上对它们进行了评估。评估结果表明,在六个模型中,GP(高斯过程)模型在跟踪和预测 IPID 值方面具有更高的准确性。利用基于 GP 的预测分析,我们开发了一款名为 ZPredict 的工具,用于推断目标网络或服务器的各种有利信息。我们在一个大型公共服务器数据集上进行的评估证明了它在空闲端口扫描、衡量俄罗斯审查制度和推断源地址验证(SAV)方面的有效性。我们的研究方法符合道德规范,在开发过程中考虑到了与测量相关的问题,以减少任何潜在危害。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
7.20
自引率
4.30%
发文量
567
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信