Fingerprinting reverse proxies using timing analysis of TCP flows

Approved for public release; distribution is unlimited === Reverse proxy servers are valuable assets to defend outside hosts from seeing the internal network structure upon which the reverse proxy is serving. They are frequently used to protect valuable files, systems, and internal users from extern...

Full description

Bibliographic Details
Main Author: Weant, Matthew S.
Other Authors: Xie, Geoffrey
Published: Monterey, California: Naval Postgraduate School 2013
Online Access:http://hdl.handle.net/10945/37740
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-37740
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-377402014-11-27T16:19:13Z Fingerprinting reverse proxies using timing analysis of TCP flows Weant, Matthew S. Xie, Geoffrey Beverly, Robert Rohrer, Justin P. Computer Science Approved for public release; distribution is unlimited Reverse proxy servers are valuable assets to defend outside hosts from seeing the internal network structure upon which the reverse proxy is serving. They are frequently used to protect valuable files, systems, and internal users from external users while still providing services to outside hosts. Another aspect of reverse proxies is that they can be installed remotely by malicious actors onto compromised machines in order to service malicious content while masking where the content is truly hosted. Reverse proxies interact over the HyperText Transfer Protocol (HTTP), which is delivered via the Transmission Control Protocol (TCP). TCP flows provide various details regarding connections between an end host and a server. One such detail is the timestamp of each packet delivery. Concurrent timestamps may be used to calculate round trip times with some scrutiny. Previous work in timing analysis suggests that active HTTP probes to servers can be analyzed at the originating host in order to classify servers as reverse proxies or otherwise. We collect TCP session data from a variety of global vantage points, actively probing a list of servers with a goal of developing an effective classifier to discern whether each server is a reverse proxy or not based on the timing of packet round trip times. 2013-11-20T23:36:35Z 2013-11-20T23:36:35Z 2013-09 Thesis http://hdl.handle.net/10945/37740 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California: Naval Postgraduate School
collection NDLTD
sources NDLTD
description Approved for public release; distribution is unlimited === Reverse proxy servers are valuable assets to defend outside hosts from seeing the internal network structure upon which the reverse proxy is serving. They are frequently used to protect valuable files, systems, and internal users from external users while still providing services to outside hosts. Another aspect of reverse proxies is that they can be installed remotely by malicious actors onto compromised machines in order to service malicious content while masking where the content is truly hosted. Reverse proxies interact over the HyperText Transfer Protocol (HTTP), which is delivered via the Transmission Control Protocol (TCP). TCP flows provide various details regarding connections between an end host and a server. One such detail is the timestamp of each packet delivery. Concurrent timestamps may be used to calculate round trip times with some scrutiny. Previous work in timing analysis suggests that active HTTP probes to servers can be analyzed at the originating host in order to classify servers as reverse proxies or otherwise. We collect TCP session data from a variety of global vantage points, actively probing a list of servers with a goal of developing an effective classifier to discern whether each server is a reverse proxy or not based on the timing of packet round trip times.
author2 Xie, Geoffrey
author_facet Xie, Geoffrey
Weant, Matthew S.
author Weant, Matthew S.
spellingShingle Weant, Matthew S.
Fingerprinting reverse proxies using timing analysis of TCP flows
author_sort Weant, Matthew S.
title Fingerprinting reverse proxies using timing analysis of TCP flows
title_short Fingerprinting reverse proxies using timing analysis of TCP flows
title_full Fingerprinting reverse proxies using timing analysis of TCP flows
title_fullStr Fingerprinting reverse proxies using timing analysis of TCP flows
title_full_unstemmed Fingerprinting reverse proxies using timing analysis of TCP flows
title_sort fingerprinting reverse proxies using timing analysis of tcp flows
publisher Monterey, California: Naval Postgraduate School
publishDate 2013
url http://hdl.handle.net/10945/37740
work_keys_str_mv AT weantmatthews fingerprintingreverseproxiesusingtiminganalysisoftcpflows
_version_ 1716725541350932480