Systems and methods for determining characteristics of a network and analyzing vulnerabilities

ABSTRACT

A packet transmitted on a network is read and decoded. A network device and its operating system are identified by analyzing the decoded packet. If more than one operating system is identified from the decoded packet, the operating system is selecting by comparing confidence values assigned to the operating systems identified. A service running on the network device is identified from the decoded packet or subsequent packets that are read, decoded and analyzed. The network topology of a network is determined by reading, decoding, and analyzing a plurality of packets. A flow between two network devices is determined by reading, decoding, and analyzing a plurality of packets. Vulnerabilities are assigned to operating systems and services identified by reading, decoding, and analyzing packets. Network configuration policy is enforced on operating systems and services identified by reading, decoding, and analyzing packets.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of U.S. Provisional Patent Application Ser. No. 60/469,395 filed May 12, 2003, which is herein incorporated by reference in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

Embodiments of the present invention relate to systems and methods for determining the characteristics of a computer network. More particularly, embodiments of the present invention relate to systems and methods for automatically and passively determining a host configuration of a computer network.

2. Background Information

Computers and computer networks connecting such computers are vital components of modern society. Unfortunately, such computer networks are susceptible to attacks from internal and external hostile sources. Intrusion detection systems (IDSs) are used to prevent such attacks. Conventional IDSs operate by analyzing network traffic in terms of the traffic itself. They do not, however, consider the end points of that traffic. End points refer to the originators and recipients of message traffic. Such end points include, for example, clients and the servers. Analysis of end points can provide contextual information about the network such as host addresses and services. By not considering these end points, a vital piece of contextual information about the network is missed. Consequently, a substantial need exists for technologies that provide information about the end points of computer network traffic.

IDSs are less effective than they could be because they do not have contextual information about the computer network they are monitoring. For example, without contextual information, IDSs are susceptible to a computer network attack known as evasion. Evasion occurs when an attacker uses network endpoint information that the IDS does not have, to evade detection by the IDS.

A known method of evasion is insertion. Insertion can be used in networks having a routing infrastructure that handles packets of different sizes. For example, a routing link (router or some other device) may be attached to a network that supports a 1500 byte maximum size on one side of the device and 500 bytes on the other. If someone was trying to talk to a host on the other side of the device, the maximum packet size they could send is 500 bytes. This maximum is called the “Path MTU” (Maximum Transfer Unit). If an attacker knows this, they can transmit a large packet between two properly sized packets and get the IDS to accept the oversized packet, giving the IDS a bad model of the data that is actually arriving at the host.

Not only does the lack of contextual information make the IDS more susceptible to attack, but it also makes the IDS less efficient. One such inefficiency is that, without contextual information, the IDS may not be able to discern whether or not an attack will cause harm. Attacks can be directed to a particular service running on a target host. Without information about the services running on the target host, an IDS could mistakenly detect an attack even if that host is not running the targeted service. That is, the IDS would cause an alarm even though the attack would be harmless. Such an event is called a false positive. Large numbers of false positives can make it more difficult and expensive to locate genuine attacks that can harm a host on the network.

Some conventional techniques for providing contextual information to IDSs are known. One such technique is for a human to audit each host manually and gather all desired contextual information. This manual method has a number of disadvantages including that it is time consuming, prone to error, and makes maintenance more difficult. One reason for these drawbacks is that networks are dynamic in nature. Host computers in computer networks are added, removed, and reconfigured. If these changes are not meticulously documented, each computer on the network must be revisited periodically to insure that the contextual information is up to date.

Another conventional technique for providing contextual information to an IDS is an automatic discovery system. Conventional automatic discovery systems are active scanning systems that actively probe end hosts on a computer network and perform stimulus response tests on them to find and record vulnerabilities that exist on end hosts. Though not manual, active scanning systems also suffer from several problems. One problem is that active scanning can be destructive to the network. In testing for vulnerabilities, they can cause both routers and servers to malfunction or stop functioning. Another problem is that they may not provide information useful to an IDS because in many instances a one-to-one mapping does not exist between the information an active scanner provides and the information an IDS can use. Another problem is that active scanners only provide a snapshot of the network at the time when the scan is performed. This snapshot is problematic because a host may run a vulnerable service transiently. In such a case, the active scanning may be performed at a time when the vulnerable service is not running. As a result, the active scan would not cause an alarm despite the transient nature of the vulnerability.

In view of the foregoing, it can be appreciated that a substantial need exists for systems and methods that can advantageously automatically and passively determine a host configuration of a computer network.

BRIEF SUMMARY OF THE INVENTION

One embodiment of the present invention is a method for automatically and passively determining the characteristics of a network. One or more packets transmitted on the network are read. A network device on the network is identified using the one or more packets. The identity of the network device is recorded. In a preferred embodiment of the present invention, the operating system of the network device and one or more services running on the device are identified from one or more packets and are recorded. In another embodiment of the present invention, the recorded information is reported to an IDS or a network management system (NMS).

Another embodiment of the present invention is a method for identifying a network device's operating system on a network. A packet transmitted on the network is read. The packet is decoded into one or more fields. The one or more fields are compared to an operating system identifying data structure. Any matched operating system is recorded.

Another embodiment of the present invention is a system for automatically and passively determining the characteristics of a network. The system includes a packet detector, a packet decoder, a protocol field analyzer, and a network device database. The packet detector detects and reads one or more packets transmitted on the network by a network device. The packet decoder decodes the one or more packets into one or more protocol fields. The protocol field analyzer determines information about the network device using the one or more protocol fields. The network device database receives and stores the information about the network device.

Another embodiment of the present invention is a method for identifying a router on a network from two packets identifying primary media access control addresses and a third packet identifying a secondary media access control address. A first packet transmitted on the network is read. The first packet is decoded into a first plurality of protocol fields. Either the address resolution protocol or the dynamic host configuration protocol is identified from the first plurality of protocol fields. A first Internet protocol address and a first primary media access control address are identified from the address resolution protocol or the dynamic host configuration protocol. A second packet transmitted on the network is read. The second packet is decoded into a second plurality of protocol fields. Either the address resolution protocol or the dynamic host configuration protocol is identified from the second plurality of protocol fields. A second Internet protocol address and a second primary media access control address are identified from the address resolution protocol or the dynamic host configuration protocol. A third packet transmitted on the network is read. The third packet is decoded into a third plurality of protocol fields. An Internet protocol address and a media access control address are identified from the third plurality of protocol fields. If the Internet protocol address is the second Internet protocol address and the media access control address is the first primary media access control address, then an initiator of the first packet is identified as the router.

Another embodiment of the present invention is a method for identifying a router on a network from one packet identifying a primary media access control address and a second packet identifying a network device at least one hop away. A first packet transmitted on the network is read. The first packet is decoded into a first plurality of protocol fields. Either the address resolution protocol or the dynamic host configuration protocol is identified from the first plurality of protocol fields. A first Internet protocol address and a first primary media access control address are identified from the address resolution protocol or the dynamic host configuration protocol. A second packet transmitted on the network is read. The second packet is decoded into a second plurality of protocol fields. An Internet protocol address and a media access control address are identified from the second plurality of protocol fields, where the Internet protocol address is not the same as the first Internet protocol address and the media access control address is the same as the first primary media access control address. The number of hops traveled by the second packet is determined from the second plurality of protocol fields. If the number of hops is not equal to zero, then the initiator of the first packet is identified as the router.

Another embodiment of the present invention is a method for identifying a subnet on a network. A first packet transmitted on the network is read. The first packet is decoded into a first plurality of protocol fields. Either the address resolution protocol or the dynamic host configuration protocol is identified from the first plurality of protocol fields. A first Internet protocol address and a first primary media access control address are identified from the address resolution protocol or the dynamic host configuration protocol. A second packet transmitted on the network is read. The second packet is decoded into a second plurality of protocol fields. Either the address resolution protocol or the dynamic host configuration protocol is identified from the second plurality of protocol fields. A second Internet protocol address and a second primary media access control address are identified from the address resolution protocol or the dynamic host configuration protocol. A third packet transmitted on the network is read. The third packet is decoded into a third plurality of protocol fields. A source Internet protocol address, a source media access control address, a destination Internet protocol address, and a destination media access control address are identified from the third plurality of protocol fields. If the source Internet protocol address is the same as the first Internet protocol address, the source media access control address is the same as the first primary media access control address, the destination Internet protocol address is the same as the second Internet protocol address, and the destination media access control address is the same as the second primary media access control address, then a network encompassing an initiator of the first packet and an initiator of the second packet is identified as a subnet.

Another embodiment of the present invention is a method for determining the distance between a first subnet and a second subnet on a network. A network device with a network device Internet protocol address, a network device primary media access control address, and a network device time-to-live value is identified on the first subnet. A router with a router Internet protocol address and a router primary media access control address is identified on the second subnet. A packet transmitted on the network is read. The packet is decoded into a plurality of protocol fields. A source Internet protocol address, a source media access control address, a destination Internet protocol address, and a packet time-to-live value are identified from the plurality of protocol fields. If the source Internet protocol address is the same as the network device Internet protocol address, the source media access control address is the same as the router primary media access control address, and the destination Internet protocol address is within an address space of the second subnet, then the distance between the two subnets is the difference between the network device time-to-live value and the packet time-to-live value.

Another embodiment of the present invention is a method for creating an inferred subnet on a network. A router with a router Internet protocol address and a router primary media access control address is identified on a known subnet. A packet transmitted on the network is read. The packet is decoded into a plurality of protocol fields. A source Internet protocol address, a source media access control address, and a destination Internet protocol address are identified from the plurality of protocol fields. If the address space of the known subnet does not encompass the source Internet protocol address, the source media access control address is the same as the router primary media access control address, and the destination Internet protocol address is within an address space of the known subnet, then the inferred subnet is created and the source Internet protocol address is added to the inferred subnet.

Another embodiment of the present invention is a method for identifying a service running on a network device from a packet. A packet transmitted by the network device on the network is read. The packet is decoded into one or more protocol fields. The one or more fields are compared to a service identifying data structure. A matched service is recorded as the service running on the network device.

Another embodiment of the present invention is a method for identifying a service running on a network device from two or more packets. A flow between an initiator network device and a responder network device is identified by reading, decoding, and analyzing two or more packets transmitted on the network. One or more packets of the flow are identified as one or more initiator packets. One or more packets of the flow are identified as one or more responder packets. If protocol fields of the one or more initiator packets match initiator protocol fields of the service and if protocol fields of the one or more responder packets match responder protocol fields of the service, then a service is identified as running on either the initiator network device or the responder network device.

Another embodiment of the present invention is a method for identifying a service running on a network device by comparing protocol fields of one or more packets from a flow to a service identifying data structure. A service identifying data structure is maintained that identifies one or more protocol fields for one or more services. A flow between an initiator network device and responder network device is identified by reading, decoding, and analyzing two or more packets transmitted on the network. One or more protocol fields of one or more packets of the flow are compared to one or more protocol fields of one or more services of the service identifying data structure. A matching service is recorded for either the initiator network device or the responder network device.

Another embodiment of the present invention is a method for identifying transmission control protocol flow on a network. A first packet transmitted on the network is read. The first packet is decoded into a first plurality of protocol fields. A first source Internet protocol address, a first destination Internet protocol address, a first transport protocol, a first source port, a first destination port, and a first synchronization bit are identified from the first plurality of protocol fields. The first source Internet protocol address, the first destination Internet protocol address, the first transport protocol, the first source port, and the first destination port are the first five-tuple. A second packet transmitted on the network is read. The second packet is decoded into a second plurality of protocol fields. A second source Internet protocol address, a second destination Internet protocol address, a second transport protocol, a second source port, a second destination port, a second acknowledged bit, and a second synchronization bit are identified from the second plurality of protocol fields. The second source Internet protocol address, the second destination Internet protocol address, the second transport protocol, the second source port, and the second destination port are the second five-tuple. If the first transport protocol is transmission control protocol, the second transport protocol is transmission control protocol, the first synchronization bit is set, the second synchronization bit is set, the second acknowledge bit is set, the first source Internet protocol address is the same as the second destination Internet protocol address, the second source Internet protocol address is the same as the first destination Internet protocol address, the first source port is the same as the second destination port, and the second source port is the same as the first destination port, then a third packet that corresponds to either the first five-tuple or the second 5-tuple is identified as part of the flow.

Another embodiment of the present invention is a method for identifying user datagram protocol flow on a network. A first packet transmitted on the network is read. The first packet is decoded into a first plurality of protocol fields. A first source Internet protocol address, a first destination Internet protocol address, a first transport protocol, a first source port, and a first destination port are identified from the first plurality of protocol fields. The first source Internet protocol address, the first destination Internet protocol address, the first transport protocol, the first source port, and the first destination port are the first five-tuple. A second packet transmitted on the network is read. The second packet is decoded into a second plurality of protocol fields. A second source Internet protocol address, a second destination Internet protocol address, a second transport protocol, a second source port, and a second destination port are identified from the second plurality of protocol fields. The second source Internet protocol address, the second destination Internet protocol address, the second transport protocol, the second source port, and the second destination port are the second five-tuple. If the first transport protocol is user datagram protocol, the second transport protocol is user datagram protocol, the first source Internet protocol address is the same as the second destination Internet protocol address, the second source Internet protocol address is the same as the first destination Internet protocol address, the first source port is the same as the second destination port, and the second source port is the same as the first destination port, then a third packet that corresponds to either the first five-tuple or the second five-tuple is identified as part of the flow.

Another embodiment of the present invention is a method for selecting an operating system of a network device from the results of two or more operating system identification techniques used in a passive network detection system. Two or more operating system identification techniques are employed to create two or more operating system results. Each of the two or more operating system results is assigned a confidence value. The confidence values of the two or more operating system results are compared. A result with a highest confidence value is selected as the operating system of the network device.

Another embodiment of the present invention is a method for selecting a service of a network device from the results of two or more service identification techniques used in a passive network detection system. Two or more service identification techniques are employed to create two or more service results. Each of the two or more service results is assigned a confidence value. The confidence values of the two or more service results are compared. A result with a highest confidence value is selected as the service of the network device.

Another embodiment of the present invention is a method for determining the confidence value of a result of an operating system or a service by considering previous results obtained by more than one identification technique used in a passive network detection system. A result is identified from a first one or more packets by an identifying technique. If the result is equivalent to a previous result, a confirming increment value is added to the confidence value of the previous result to produce a confidence value of the result. The confirming increment value is calculated as one half the absolute value of the difference between the confidence value of the previous result and the confidence value of the result. If the result is not equivalent to a previous result, a detracting increment value is calculated as one half of the confirming increment value and the detracting increment value is subtracted from the confidence value of the previous result to produce the confidence value of the result. A subsequent result is identified from a second one or more packets by another identifying technique. If the subsequent result is equivalent to the result, the confirming increment value is calculated as one half an absolute value of a difference between the confidence value of the previous result and the confidence value of the result and the confirming increment value is added to the confidence value of the result to produce a confidence value of the subsequent result. If the subsequent result is not equivalent to the result and the result is not equivalent to a previous result, the detracting increment value is doubled and the detracting increment value is subtracted from the confidence value of the result to produce the confidence value of the subsequent result. If the subsequent result is not equivalent to the result and the result is equivalent to a previous result, the detracting increment value is calculated as one half of the confirming increment value and the detracting increment value is subtracted from the confidence value of the result to produce the confidence value of the subsequent result.

Another embodiment of the present invention is a method for assigning a vulnerability to a network device on a network based on the operating system the network device is using. A vulnerability of an operating system is predefined. The operating system the network device is using is determined by reading, decoding, and analyzing a packet transmitted on the network. The vulnerability of the operating system the network device is using is assigned to the network device.

Another embodiment of the present invention is a method for assigning a vulnerability to a network device on a network based on the service running on the network device. A vulnerability of a service is predefined. The service the network device is running is determined by reading, decoding, and analyzing a packet transmitted on the network. The vulnerability of the service the network device is running is assigned to the network device.

Another embodiment of the present invention is a method for creating a normalized vulnerabilities database for use in a passive network detection system. A list of predefined vulnerabilities is gathered, where each vulnerability has at least one operating system name or service name. One or more operating system groups are created from the list, where each of the operating system groups has one or more vulnerabilities that list one or more operating system names that identify a unique operating system. A single operating system identifier is assigned to the each operating system group. Lookup is provide from the passive network detection system to the operating system groups by the single operating system identifier. One or more service groups are created from the list of vulnerabilities, where each of the service groups has one or more vulnerabilities that have one or more service names that identify a unique service. A single service identifier is assigned to each of the service groups. Lookup is provided from the passive network detection system to the each of the service groups by the single service identifier.

Another embodiment of the present invention is a method for enforcing a network configuration and usage policy based on an operating system using a passive network detection system. The network configuration and usage policy for an operating system is predefined. The operating system used by the network device on the network is determined by reading, decoding, and analyzing a packet transmitted on the network. An action identified by the network configuration and usage policy for the operating system is performed.

Another embodiment of the present invention is a method for enforcing a network configuration and usage policy based on a service using a passive network detection system. The network configuration and usage policy for a service is predefined. The service running on the network device on the network is determined by reading, decoding, and analyzing a packet transmitted on the network. An action identified by the network configuration and usage policy for the service is performed.

Another embodiment of the present invention is a passive network detection system that includes a packet reader, a packet decoder, a flow analyzer, an operating system detector, a service detector, a network change monitor, a host representation monitor, a normalized vulnerability list, a host representation storage, a flow analysis data storage, a policy component, a network topology component, a mapping component, and a results reporter.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a flowchart showing a method for automatically and passively determining the characteristics of a network in accordance with an embodiment of the present invention.

FIG. 2 is an exemplary data structure used to store host information, in accordance with an embodiment of the present invention.

FIG. 3 shows portions of two exemplary packets that can be decoded, in accordance with an embodiment of the present invention.

FIG. 4 is a flowchart showing a method for fingerprinting, in accordance with an embodiment of the present invention.

FIG. 5 is an exemplary fingerprint table, in accordance with an embodiment of the present invention.

FIG. 6 is a flowchart showing a method for determining an operating system from network protocol fields where the fingerprint table is selected based on the type of host, in accordance with an embodiment of the present invention.

FIG. 7 is a flowchart showing a method for determining the operating system from application protocol fields where the fingerprint table is selected based on an application protocol, in accordance with an embodiment of the present invention.

FIG. 8 shows an exemplary fingerprint database entry, in accordance with an embodiment of the present invention.

FIG. 9 is a schematic diagram illustrating a system for characterizing a network, in accordance with an embodiment of the present invention.

FIG. 10 is a flowchart showing a method for identifying a router on a network from two packets identifying primary media access control addresses and a third packet identifying a secondary media access control address, in accordance with an embodiment of the present invention.

FIG. 11 is a flowchart showing a method for identifying a router on a network from one packet identifying a primary media access control address and a second packet identifying a network device at least one hop away, in accordance with an embodiment of the present invention.

FIG. 12 is a flowchart showing a method for identifying a subnet on a network, in accordance with an embodiment of the present invention.

FIG. 13 is a flowchart showing a method for determining the distance between two subnets on a network, in accordance with an embodiment of the present invention.

FIG. 14 is a flowchart showing a method for creating an inferred subnet on a network, in accordance with an embodiment of the present invention.

FIG. 15 is a flowchart showing a method for identifying a service running on a network device from a packet, in accordance with an embodiment of the present invention.

FIG. 16 is a flowchart showing a method for identifying a service running on a network device from two or more packets, in accordance with an embodiment of the present invention.

FIG. 17 is a flowchart showing a method for identifying a service running on a network device by comparing protocol fields of one or more packets from a flow to a service identifying data structure, in accordance with an embodiment of the present invention.

FIG. 18 is a flowchart showing a method for identifying transmission control protocol flow on a network, in accordance with an embodiment of the present invention.

FIG. 19 is a flowchart showing a method for identifying user datagram protocol flow on a network, in accordance with an embodiment of the present invention.

FIG. 20 is a flowchart showing a method for selecting an operating system of a network device from the results of two or more operating system identification techniques used in a passive network detection system, in accordance with an embodiment of the present invention.

FIG. 21 is a flowchart showing a method for selecting a service of a network device from the results of two or more service identification techniques used in a passive network detection system, in accordance with an embodiment of the present invention.

FIG. 22 is a flowchart showing a method for determining the confidence value of a result of an operating system or a service by considering previous results obtained by more than one identification technique used in a passive network detection system, in accordance with an embodiment of the present invention.

FIG. 23 is a flowchart showing a method for assigning a vulnerability to a network device on a network based on the operating system the network device is using, in accordance with an embodiment of the present invention.

FIG. 24 is a flowchart showing a method for assigning a vulnerability to a network device on a network based on the service the network device is running, in accordance with an embodiment of the present invention.

FIG. 25 is a flowchart showing a method for creating a normalized vulnerabilities database for use in a passive network detection system, in accordance with an embodiment of the present invention.

FIG. 26 is a flowchart showing a method for enforcing a network configuration and usage policy based on an operating system using a passive network detection system, in accordance with an embodiment of the present invention.

FIG. 27 is a flowchart showing a method for enforcing a network configuration and usage policy based on a service using a passive network detection system, in accordance with an embodiment of the present invention.

FIG. 28 is a schematic diagram illustrating a passive network detection system, in accordance with an embodiment of the present invention.

Before one or more embodiments of the invention are described in detail, one skilled in the art will appreciate that the invention is not limited in its application to the details of construction, the arrangements of components, and the arrangement of steps set forth in the following detailed description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced or being carried out in various ways. Also, it is to be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting.

DETAILED DESCRIPTION OF THE INVENTION

Embodiments of systems and methods for automatically and passively determining the characteristics of a network are described in this detailed description of the invention. In this detailed description, for purposes of explanation, numerous specific details are set forth to provide a thorough understanding of embodiments of the present invention. One skilled in the art will appreciate, however, that embodiments of the present invention may be practiced without these specific details. In other instances, structures and devices are shown in block diagram form. Furthermore, one skilled in the art can readily appreciate that the specific sequences in which methods are presented and performed are illustrative and it is contemplated that the sequences can be varied and still remain within the spirit and scope of embodiments of the present invention.

Embodiments of the present invention are automatic, passive network discovery systems. These systems are passive because they examine packets moving across a network; they do not perform active scans. They are automatic because they require little or no human intervention. Embodiments of the present invention operate by performing functions including: (1) identifying each network device on a network; (2) identifying operating system and services running on each network device (preferably, with some level of assurance); (3) recording, in real-time, any changes occurring on the network; and (4) gathering this information in a format that can be used by a network reporting mechanism. Exemplary network reporting mechanisms include IDSs and NMSs.

Embodiments of the present invention examine each packet moving across a network in real-time, for characteristic information about the network. One such type of characteristic information is information related to a network device, or host, on the network. One skilled in the art will appreciate that a network device is any device with a network connection. Network devices include but are not limited to computers, printers, switches, game machines, and routers.

FIG. 1 is a flowchart showing a method 100 for automatically and passively determining the characteristics of a network in accordance with an embodiment of the present invention.

In step 110 of method 100, a packet transmitted on a network is read.

In step 120, a network device is identified using the packet. A network device includes but is not limited to a computer, a printer, and a router. One skilled in the art will appreciate that a network device can also be referred to as a host.

In step 130, the identity of the network device is recorded. The identity is stored as a data structure in a file or database, for example. If a packet identifies a network device that has previously been recorded, the current information and the previous information are compared and any changes are recorded. If no changes have been found, no new information is recorded. In either case, method 100 returns to step 110 to read the next packet.

FIG. 2 is an exemplary data structure used to store network device information, or host information, in accordance with an embodiment of the present invention. This data structure is the host representative data structure. In one embodiment of the present invention, host information includes the initiator Internet protocol (IP) address, a list of media access control (MAC) addresses with a time-to-live (TTL) parameter for each MAC address, a list of operating systems, a list of network protocols, a list of transport protocols, a list of transmission control protocol (TCP) service data structures, a list of user datagram protocol (UDP) service data structures, a virtual local area network (VLAN) tag, and a last seen time. The IP address, MAC address and TTL parameter of at least one network device on the network are typically included in each packet transmitted on the network. As a result, these pieces of host information are obtained by directly parsing the network and transport protocol fields of each packet.

For example, FIG. 3 shows portions of two exemplary packets that can be decoded, in accordance with an embodiment of the present invention. The initiator IP address and TTL parameter are obtained directly from the IP section. The MAC address (not shown) can be obtained directly by parsing another section of the packet. As shown in the first exemplary packet, the initiator IP address is 10.1.1.51, and the TTL parameter is 64. As shown in the second exemplary packet, the initiator IP address is 10.1.1.4, and the TTL parameter is 64.

In another embodiment, host information can be used to detect changes that have occurred in the network. For example, by comparing IP addresses and MAC addresses over time, it can be determined if IP addresses have been reassigned.

In another embodiment, host information can also be used to detect and respond to network attacks. For example, the TTL portion of the host identification information corresponds to the number of routing points between the computer generating the packet and the system detecting the packet to extract the host identification information. Some insertion attacks rely on the IDS not knowing its logical location (i.e., the number of routing points between the IDS and the target machine) with respect to a target machine. Thus, an IDS can analyze the TTL portion of the host information and provide an attack alarm if the TTL portion is outside a predefined bound.

Other host information is also useful in determining the characteristics of a network. One such piece of host information is the operating system of each host. The operating system is not transmitted in a packet and therefore cannot be obtained directly from the packet. Embodiments of the present invention obtain the operating system of a host machine by comparing decoded packet fields to elements of predefined operating system identifying data structures. One or more elements of an operating system identifying data structure that identify an operating system are referred to as a “fingerprint.” An operating system identifying data structure is referred to as a “fingerprint table.” The process of comparing decoded packets to elements of a fingerprint table is referred to as “fingerprinting.”

FIG. 4 is a flowchart showing a method 400 for fingerprinting, in accordance with an embodiment of the present invention.

In step 410 of method 400, a packet transmitted on the network is read.

In step 420, the packet is decoded into fields. A host representative data structure is created and populated with one or more of the decoded fields.

In step 430, the decoded fields are compared to a fingerprint table.

In step 440, a matched operating system is recorded. The matched operating system is added to the host representative data structure. In another embodiment, the matched operating system is reported to a network reporting mechanism. Method 400 is executed for each packet intercepted on the network.

FIG. 5 is an exemplary fingerprint table, in accordance with an embodiment of the present invention. In this embodiment, the fingerprint table is implemented as a linked list. The operating system fingerprint table can be implemented in other ways as well, including implementation as a balanced tree (B-tree) or Adelson-Velski Landis tree (AVL-tree). In this embodiment, network and transport protocol fields from a packet are compared to rows in the linked list. As shown in FIG. 5, the window size field is compared to each item in the window size row. If a match is found, the next packet field in the fingerprint is compared to the item in the row immediately below the match. Again, comparisons are made with items in the row until a match is found. This process continues until a match is found with the last field or until a row is traversed without a match. If all of the parsed packet fields match a branch of the fingerprinting table, an operating system for the host has been detected and the host representative data structure is updated.

Another embodiment of the present invention is a method in which the operating system of a host is identified using separate network and application fingerprints. A “network fingerprint” is one or more packet fields within a network protocol or transport protocol used to uniquely define a host. An “application fingerprint” is one or more fields within an application protocol used to uniquely define a host.

In this method, a transmitted packet is read on a network. The packet is decomposed into network protocol fields, transport protocol fields, and application protocol fields. These fields are stored in the host representative data structure as network protocols, transport protocols, TCP service data structures, and UDP service data structures (as shown in FIG. 2). Packets containing network and transport protocol fields are compared with the network fingerprint tables, packets containing application protocol fields are compared with the application fingerprint tables, and packets containing both network protocol fields, transport protocol fields, and application protocol fields are compared with both the network fingerprint tables and application fingerprint tables. Any matched operating systems are reported to a network reporting mechanism. IP is an exemplary network protocol. TCP is an exemplary network protocol. Network basic input/output system/server message block (NETBIOS/SMB) is an exemplary application protocol.

In one embodiment of this method, the type of host is identified and used to select the network fingerprint table that is compared to the network and transport protocol fields. Types of hosts include an initiator and a responder. For a host computer, an initiator is referred to as a client, and a responder is referred to as a server.

FIG. 6 is a flowchart showing a method 600 for determining an operating system from network protocol fields where the fingerprint table is selected based on the type of host, in accordance with an embodiment of the present invention. In method 600, network protocol fields have already been decoded from a transmitted packet and stored in a host representative data structure.

In step 610, a TCP flag field is used to determine if the packet is from a server or client computer. In particular, the synchronization acknowledged (SYN/ACK) flag is queried first. If the SYN/ACK flag is set, then the packet was being sent by a server and step 630 is executed. If the SYN/ACK flag is not set, then step 620 is executed.

In step 620, the (synchronization) SYN flag is queried. If the SYN flag is set, then the packet was sent by a client and step 640 is executed. If the SYN flag is not set, then the method ends.

In step 630, a server fingerprint table is selected for packets sent by servers.

In step 640, a client fingerprint table is selected for packets sent by clients.

In step 650, the selected fingerprint table is traversed. Other decoded network fields are compared to the selected fingerprint table.

In step 660, a decision is made as a result of the comparison with the selected fingerprint table in step 650. If the operating system is found, step 670 is executed. If an operating system is not found, step 680 is executed.

In step 670, the host representative data structure is updated with the matched operating system.

In step 680, the fingerprint of the network fields is recorded in an unknown fingerprint file.

In step 690, a matched operating system is reported to a network reporting mechanism.

In another embodiment of the present invention, a “network fingerprint” includes the window size, maximum segment size, (don't fragment) DF bit, TCP options list, window scale, IP Id trend, and TTL fields of a TCP/IP packet. These packet fields are parsed for comparison with the selected fingerprint table. In the case of server fingerprints, the server network protocol fields are influenced by the corresponding client packet. The server fingerprint matching masks the fields of the server packet and the target fingerprint by the fields of the client packet prior to comparing the fields.

FIG. 7 is a flowchart showing a method 700 for determining the operating system from application protocol fields where the fingerprint table is selected based on an application protocol, in accordance with an embodiment of the present invention. In method 700, application protocol fields have already been decoded from a transmitted packet and stored in a host representative data structure.

In step 710, it is determined if the application protocol fields are from an SMB protocol packet contained within a NETBIOS datagram packet. If the application protocol fields are from an SMB protocol packet, step 720 is executed. If the application protocol fields are not from an SMB protocol packet, then the method ends.

In step 720, an application fingerprint table is selected for comparison with the application protocol fields.

In step 750, the application protocol fields are compared to the selected application fingerprint table. In one embodiment of this method, the operating system (OS) major number, OS minor number, and flag fields from the SMB protocol are combined to generate a key for indexing into the application fingerprint table, which is a hash table.

In step 760, a decision is made as a result of the comparison with the selected application fingerprint table in step 750. If the operating is found, step 770 is executed. If an operating system is not found, step 780 is executed.

In step 770, the host representative data structure is updated with the matched operating system.

In step 780, the application fingerprint of the application protocol fields is recorded in an unknown fingerprint file.

In step 790, a matched operating system is reported to a network reporting mechanism.

As shown in FIG. 2, the host representative data structure includes at least one operating system obtained by traversing the appropriate fingerprinting table and other information about the host gained directly from the packet as described above. It also has lists of TCP and UDP host services that can be added as described below. A host representative data structure is used as input to an IDS or an NMS. If the parsed packet fields do not match a column of a fingerprint table, the packet fields are written to an unknown fingerprint file. Items from this file may later be added to the fingerprinting table when the operating system they describe is identified.

When a host generates traffic that has fingerprints within multiple fingerprint tables, the operating system that is chosen for the host representative data structure is based on fingerprint table priority. The most reliable fingerprinting method is application based fingerprinting and is thus the highest priority fingerprint table. The server packets are influenced by the client packets and are thus the lowest priority fingerprints.

In one embodiment of the present invention, a fingerprint table is created from a database table. FIG. 8 shows an exemplary fingerprint database entry, in accordance with this embodiment. Each database row in a table represents parsed packet fields that correspond to a type of operating system. Database rows are grouped based on the type of fingerprint table. Exemplary groupings for a network server fingerprint table, a network client fingerprint table and an application fingerprint table are shown in FIG. 8. In one embodiment of the present invention, the fingerprint database is created and updated manually. Items originally created in the unknown fingerprint file may be moved to the fingerprint database when the operating system is identified.

After identifying each host on the network, an embodiment of the present invention identifies services running on each host. In one embodiment, the services being run on servers are identified using TCP/IP ports. Clients generally use random ports to connect to servers, but servers generally connect to clients through fixed ports. Most services use specific or default ports. By examining traffic between clients and specific server ports, the type of service can be deduced. For example, traffic to and from a server port 80 suggests the server is a web server. The packets of this traffic can then be parsed to determine the exact type of web server. Having identified the host in the previous step, each service found for each host can be added to a list of services data structure attached to the host representative data structure of the host, as shown in FIG. 2.

Because embodiments of the present invention continuously examine network traffic, the invention provides a third function of recording any changes occurring on the network in real-time. As described above, embodiments of the present invention can immediately update changes that have occurred to fields parsed directly from a packet. This information includes but is not limited to the IP address, MAC address and TTL parameter of the server. The invention can also update information obtained through other means in real-time. For example, such information includes the operating system and the services running on a particular host. This function makes the invention particularly advantageous over manual and active automatic methods.

An additional function of embodiments of the present invention is that they allow information to be gathered in a format that can be used to enhance intrusion detection systems or to provide continuous real-time reports of the status of the network. The host representative data structure may be used as input to an IDS. If an IDS knows the operating system and services running on a host targeted by an attack, the invention can determine whether or not the attack will be harmful. In this way, false positives can be reduced significantly. The host representative data may also be used to provide continuous real-time reports of the status of the network in an NMS. Such reports may be useful to system administrators.

FIG. 9 is a schematic diagram illustrating a system for characterizing a network, in accordance with an embodiment of the present invention. In FIG. 9, packet 905 is transmitted from network device 910 to network device 915 on network 920. Network 920 includes but is not limited to a local area network (LAN), wide area network (WAN), an intranet, an interne or the Internet. Network detection system 900 is coupled to network 920.

Network detection system 900 includes packet detector 925 to detect and read packet 905. A packet decoder 930 decodes packet 905 into protocol fields and records selected protocol fields in host representative data structure 935, as described above. For example, IP and MAC TCP fields are decoded from packet 905. Protocol field analyzer 940 identifies network device 910 using the protocol fields of packet 905. In another embodiment of this system, protocol analyzer 940 identifies the logical location of network device 910 on network 920 using the protocol fields of packet 905.

In another embodiment of this system, protocol analyzer 940 identifies the operating system of network device 910 using the protocol fields of packet 905. Protocol analyzer 940 compares protocol fields to a fingerprint table that contains lists of protocol field values for particular operating systems. In another embodiment of this system, packet decoder 930 decodes packet 905 into network protocol fields and application protocol fields. Protocol analyzer 940 further analyzes the network protocol fields to determine if packet 905 originated from a client or server. If packet 905 contains network protocol fields identifying network device 910 as a client, then protocol analyzer 940 selects client fingerprint table 945 for comparison with the network protocol fields. If packet 905 contains network protocol fields identifying network device 910 as a server, then protocol analyzer 940 selects server fingerprint table 950 for comparison with the network protocol fields. If packet 905 contains application protocol fields, then protocol analyzer 940 selects application fingerprint table 955 for comparison with the application protocol fields. Protocol analyzer 940 selects one or more fingerprint tables for analysis. Fingerprint tables are loaded into system 900 from fingerprint file 960 or a fingerprint table database. Fingerprint file 960 is stored in memory. The memory is internal or external to system 900. Matching operating systems are recorded in host representative data structure 935.

In another embodiment of this system, protocol analyzer 940 identifies the services running on network device 910 using the protocol fields decoded from packet 905.

In another embodiment of the present invention, protocol analyzer 940 reports the information stored in host representative data structure 935 to IDS 965 or an NMS. IDS 965 uses information from host representative data structure 935 to more effectively protect the network. For example, IDS 965 uses information about the network devices 910 and 915 to detect and prevent evasion attacks. In addition, IDS 965 uses information about network devices 910 and 915 to determine whether an attack is harmful, and only report those attacks that are harmful.

For each packet on network 920 that is detected and decoded, a host representative data structure is created. In one embodiment of the present invention, each host representative data structure is maintained. In another embodiment of the present invention, each host representative data structure is maintained if it provides new information or updates a previous host representative data structure. Each host representative data structure that is maintained is stored in a host representative data structure database, or network device database. In another embodiment of the present invention, a host representative data structure is maintained for a user configurable period of time. A last seen time field in the host representative data structure is set when the host representative data structure is created and each time it is updated.

Network Topology

In another embodiment of the present invention, a network topology is derived for a network by analyzing the information in the network device database. Objectives of mapping the network topology include identifying routers on the network, determining what subnets and masks are configured, determining distances between configured networks and the routers connecting them, and inferring networks and masks that are not directly observable.

A variety of data is used to form the network topology. Observed IP addresses and MAC address mappings based on the address resolution protocol (ARP) or dynamic host configuration protocol (DHCP) traffic are used. Observed communication between two MAC addresses on a network is used. Observed communication between two IP addresses, one local one remote, through a third local MAC address is used. Finally, operating system identification based on fingerprinting techniques is used.

In one embodiment of the present invention, a list of IP addresses and MAC addresses is stored in the network device database. When ARP or DHCP traffic is seen for a particular MAC address, it is determined that there is a tight mapping between a MAC address and an IP address. In other words, the network device with that MAC address is using that IP address, or the IP address has a “primary MAC address.” Once a MAC address has been mapped as a primary, a search is conducted for other IP addresses using this MAC address that are not listed as a primary. If other IP addresses use this MAC, then the primary is identified as a router.

FIG. 10 is a flowchart showing a method 1000 for identifying a router on a network from two packets identifying primary MAC addresses and a third packet identifying a secondary MAC address, in accordance with an embodiment of the present invention.

In step 1005 of method 1000, a first packet transmitted on the network is read.

In step 1010, the first packet is decoded into a first plurality of protocol fields. In a preferred embodiment of this method, the first plurality of protocol fields includes two or more of a network protocol field, a transport protocol field, and an application protocol field.

In step 1015, either ARP or DHCP is identified from the first plurality of protocol fields.

In step 1020, a first IP address and a first primary MAC address are identified from the ARP or the DHCP protocol.

In step 1025, a second packet transmitted on the network is read.

In step 1030, the second packet is decoded into a second plurality of protocol fields. In a preferred embodiment of this method, the second plurality of protocol fields includes two or more of a network protocol field, a transport protocol field, and an application protocol field.

In step 1035, either ARP or DHCP is identified from the second plurality of protocol fields.

In step 1040, a second IP address and a second primary MAC address are identified from the ARP or DHCP.

In step 1045, a third packet transmitted on the network is read.

In step 1050, the third packet is decoded into a third plurality of protocol fields. In a preferred embodiment of this method, the third plurality of protocol fields includes a network protocol field.

In step 1055, an IP address and a MAC address are identified from the third plurality of protocol fields.

In step 1060, if the IP address is the second IP address and the MAC address is the first primary MAC address, then an initiator of the first packet is identified as the router.

FIG. 11 is a flowchart showing a method 1100 for identifying a router on a network from one packet identifying a primary MAC address and a second packet identifying a network device at least one hop away, in accordance with an embodiment of the present invention.

In step 1105 of method 1100, a first packet transmitted on the network is read.

In step 1110, the first packet is decoded into a first plurality of protocol fields. In a preferred embodiment of this method, the first plurality of protocol fields includes two or more of a network protocol field, a transport protocol field, and an application protocol field.

In step 1115, either ARP or DHCP is identified from the first plurality of protocol fields.

In step 1120, a first IP address and a first primary MAC address are identified from the ARP or the DHCP.

In step 1125, a second packet transmitted on the network is read.

In step 1130, the second packet is decoded into a second plurality of protocol fields. In a preferred embodiment of this method, the second plurality of protocol fields includes two or more of a network protocol field, a transport protocol field, and an application protocol field.

In step 1135 an IP address and a MAC address are identified from the second plurality of protocol fields, where the IP address is not the same as the first IP address and the MAC address is the same as the first primary MAC address.

In step 1140, the number of hops traveled by the second packet is determined from the second plurality of protocol fields. In a preferred embodiment of this method, the number of hops traveled is determined by identifying the operating system transmitting the packet and calculating the difference between the time-to-live value of the second packet and the time-to-live default value of the operation system. The second plurality of protocol fields is compared to an operating system identifying structure. A matched operating system is selected. The default starting time-to-live value for the matched operating system is read from the operating system identifying structure. The packet time-to-live value is read from the second plurality of protocol fields. The number of hops traveled is found by comparing the default starting time-to-live value to the packet time-to-live value.

In step 1145, if the number of hops is not equal to zero, then the initiator of the first packet is identified as the router.

In another embodiment of the present invention, subnets and masks on a network are determined by observing traffic between MAC addresses that are tightly mapped to IP addresses. This is accomplished even when observing multiple networks. Traffic between two primary MAC addresses implies that the two IP addresses belonging to these MAC addresses are on the same subnet. Once IP addresses are grouped into the same subnet, the smallest subnet and mask that includes these addresses.

FIG. 12 is a flowchart showing a method 1200 for identifying a subnet on a network, in accordance with an embodiment of the present invention.

In step 1205 of method 1200, a first packet transmitted on the network is read.

In step 1210, the first packet is decoded into a first plurality of protocol fields. In a preferred embodiment of this method, the first plurality of protocol fields includes two or more of a network protocol field, a transport protocol field, and an application protocol field.

In step 1215, either ARP or DHCP is identified from the first plurality of protocol fields.

In step 1220, a first IP address and a first primary MAC address are identified from the ARP or the DHCP.

In step 1225, a second packet transmitted on the network is read.

In step 1230, the second packet is decoded into a second plurality of protocol fields. In a preferred embodiment of this method, the second plurality of protocol fields includes two or more of a network protocol field, a transport protocol field, and an application protocol field.

In step 1235, either ARP or DHCP is identified from the second plurality of protocol fields.

In step 1240, a second IP address and a second primary MAC address are identified from the ARP or the DHCP.

In step 1245, a third packet transmitted on the network is read.

In step 1250, the third packet is decoded into a third plurality of protocol fields. In a preferred embodiment of this method, the third plurality of protocol fields includes a network protocol field.

In step 1255, a source IP address, a source MAC address, a destination IP address, and a destination MAC address are identified from the third plurality of protocol fields.

In step 1260, if the source IP address is the same as the first IP address, the source MAC address is the same as the first primary MAC address, the destination IP address is the same as the second IP address, and the destination MAC address is the same as the second primary MAC address, then a network encompassing an initiator of the first packet and an initiator of the second packet is identified as a subnet.

In a preferred embodiment of this method, the smallest address space for the subnet is calculated from the first IP address and the second IP address. A bitwise exclusive-OR operation is performed with the first IP address and the second IP address to produce an intermediate result. A network mask of the subnet is calculated by counting the significant bits of the intermediate result. Either the first IP address or the second IP address is selected and a bitwise AND operation is performed with the network mask to produce the network number. The smallest address space is defined as the network mask and the network number.

If another network device is observed communicating to an address already in the observed network or subnet, the other address is also placed in the observed network. The address of the new network device is found by reading, decoding, and analyzing a packet containing ARP or DHCP. The IP address and primary MAC address are found by decoding the ARP or DHCP. The new device is identified as residing on the same network by reading, decoding, and analyzing a packet, where the source IP address is the IP address of the new network device, the source MAC address is the primary MAC address of the new network device, the destination IP address is the address of a network device known to be on the observed network, and the destination address is the primary MAC address of the network device known to be on the observed network. If the address is already within the bounds of the address/mask, no changes are made to the observed network. If the address is outside the existing observed network, the observed network is expanded to include the new address.

This process of expanding the subnets and masks to include new observed addresses continues indefinitely. When hosts from two different networks are observed talking to each other, the two networks are merged into a single network. Eventually, the list of observed subnets and masks contains a complete list of subnets and masks.

In another embodiment of the present invention, the logical distance between networks is obtained. If traffic is seen between two hosts in two different observed networks, the host between the two hosts is found to be a router connecting these two networks. The router has a primary MAC address and a secondary MAC address. If TTL values seen with the MAC addresses for the two hosts are provided, the distance between the observed networks is found by subtracting the TTL value seen with the secondary MAC from the TTL value seen with the primary MAC.

FIG. 13 is a flowchart showing a method 1300 for determining the distance between two subnets on a network, in accordance with an embodiment of the present invention.

In step 1305 of method 1300, a network device with a network device IP address, a network device primary MAC, and a network device TTL value is identified on the first subnet.

In step 1310, a router with a router IP address and a router primary MAC address is identified on the second subnet.

In step 1315, a packet transmitted on the network is read.

In step 1320, the packet is decoded into a plurality of protocol fields.

In step 1325, a source IP address, a source MAC address, a destination IP address, and a packet TTL value are identified from the plurality of protocol fields.

In step 1330, if the source IP address is the same as the network device IP address, the source MAC address is the same as the router primary MAC address, and the destination IP address is within an address space of the second subnet, then the distance between the two subnets is the difference between the network device TTL value and the packet TTL value.

In another embodiment of the present invention, inferred networks or inferred subnets are determined. When new IP addresses are seen that have not been directly observed and do not fall into an existing network definition, the host is placed into an inferred network. An inferred network is created for the IP address, with an initial subnet mask of 255.255.255.255. The distance from the observed networks is set to equal to the difference between the TTL value found and the default TTL for the operating system based on the operating system fingerprint (if it exists).

Once the inferred network is created, new non-observed hosts are added to it and the network address and mask are expanded to include the new inferred host if the new network and mask does not conflict with an existing network and mask, and if the distance metric for the host is the same as existing hosts in the network. This may not be possible if the operating has not yet been identified but, even if this technique is not used, closer inferred networks will be created with finer granularity than distant networks.

If a host in an inferred network is later seen to be on a local network, the host is removed from the inferred network and placed in appropriate observed network. This action causes the inferred network to be recalculated from the remaining hosts, and, if the addition of the host to the observed network changes the network address or mask for the observed network, all inferred networks are re-verified to ensure they do not conflict with the new observed network definition.

FIG. 14 is a flowchart showing a method 1400 for creating an inferred subnet on a network, in accordance with an embodiment of the present invention.

In step 1405 of method 1400, a router with a router IP address and a router primary MAC address are identified on a known subnet.

In step 1410, a packet transmitted on the network is read.

In step 1415, the packet is decoded into a plurality of protocol fields.

In step 1420, a source IP address, a source MAC address, and a destination IP address are identified from the plurality of protocol fields.

In step 1425, if the address space of the known subnet does not encompass the source IP address, the source MAC address is the same as the router primary MAC address, and the destination Internet protocol address is within an address space of the known subnet, then the inferred subnet is created and the source IP address is added to the inferred subnet.

Operating System Identification Techniques

In another embodiment of the present invention, an application identifies the underlying operating system on which it runs. Client broadcasted SMB traffic on UDP port 138 is examined. This is the most accurate means of differentiating among various versions of Windows™, since most Windows™ hosts run this, and there is no known way of altering the fields used for identification.

Specifically, Microsoft Windows™ browser protocol host announcements or Microsoft Windows™ browser local master announcements are inspected for two associated fields—the OS Major Version and Minor Version. Further, the Server Type field of the announcement messages can be examined to distinguish Windows NT™ hosts from Windows 98™ and Windows ME™. These values do not appear to be readily alterable.

In another embodiment of the present invention, the host operating system is identified by examining specific field values in the IP and TCP headers of a client host. A client host is identified as a host sending an initial SYN message.

In another embodiment of the present invention, the host operating system is identified after identifying a host as a server. In this embodiment too, specific field values in the IP and TCP headers of a server host are examined. A server is identified as a host responding with a SYN/ACK message on a listening port to a client request.

In both the embodiment identifying a client host and the embodiment identifying a server host, the same fields in a packet are examined. These fields include but are not limited to a TCP window size value, a DF value, a TTL value, and TCP options. A TCP window size value identifies the maximum number of bytes that will be buffered for the input received from the current connection. This field can be very distinct because the valid range of values is between 0 and 65535. Yet, this value can be easily changed by the system administrator by customizing a registry setting or TCP/IP stack parameter. In fact, IIS servers are often optimized to accept the largest possible buffer size in order to facilitate data transfer.

While TCP window size value can help to distinguish among operating systems, it is volatile because it is readily influenced by a variety of factors. As an example, certain versions of Windows™ hosts that reside on a 10 Mbps hub may yield a different default TCP window size than the same host moved to a 100 Mbps hub. The window size value is even more temperamental and variable when a server responds to a client SYN packet. In can be influenced by values in the SYN packet such as maximum segment size, window size, and the number and types of TCP options offered. Rarely, but as observed with HP printers, it may even change depending on the listening port on a server host.

The DF value indicated whether the packet may or may not be fragmented. It has a value of either 0 or 1. Most operating systems turn this flag on, however a handful disable it. It is simple to change the value of this field.

The TTL value identifies the number of hops a packet may traverse before being expired. It has a possible value range of 0-255. Typical initial values are 255, 128, 64, 60, and 32. An initial TTL value of 255 may be found in Cisco IOS versions, older Solaris™, and various other operating systems. An initial value of 128 is found in most modern Window versions, while TTL's of 64 and 60 typically reflect UNIX operating systems. A value of 32 is less common and may be associated with older versions of Windows™. This value is easily configurable.

Exemplary TCP options that are examined include the maximum segment size, the window scale, the timestamp, and the selective acknowledgement. The maximum segment size, window scale, and timestamp may contain unique values that help identify the operating system. For instance, only Windows™ hosts respond with a value of zero in both timestamp fields on a SYN/ACK packet. Support for a given TCP option or options is customizable. While TCP options are predictable and stable in SYN packets for a given operating system, server TCP options are offered only if they are observed in the client SYN packet. As an example, a server will only respond in the SYN/ACK packet with a selective acknowledgement in the TCP options if the client SYN packet included it as a TCP option. The only exception to this rule is that the maximum segment size is always included in the server SYN/ACK packet regardless if it is set in the stimulus client packet. In fact, “normal” client SYN traffic will always include a maximum segment size in the TCP options. If nmap is employed to do SYN scanning or operating system identification, it will not follow the standard behavior of including the maximum segment size in the SYN packet. However, the target server SYN/ACK will still include it in the response.

The maximum segment size value in a server SYN/ACK packet is usually set to be 40 bytes less than the MTU, although some operating systems appear to set static values that do not reflect the MTU. Occasionally, an operating system such as SunOS™ 5.7 running on SPARC™ architecture will simply reflect back the value found in the SYN packet.

Almost any combination of TCP options is valid. The only restriction appears to be that the set of options must end on a 4-byte boundary. The NOP is a 1-byte TCP option used to align on a 4-byte boundary. Infrequently, an operating system may use the EOL TCP option as the final pad. Most operating systems pre-pad a NOP to precede an option which must be padded. Individual TCP options used have a format that must be followed.

In one embodiment of the present invention, the operating system is identified from a match from only one of the three embodiments mentioned above. The order in which these embodiments are employed is application inspection, followed by client packet analysis, and finally server packet examination, if the previous embodiments do not find a match. When client or server packet inspection is employed, all examined packet values must match all respective values identified in a given operating system fingerprint. In addition, the fingerprint that first matches the packet values is deemed to be the host operating system even if there are other fingerprints that match. The embodiment is referred to as a “first match and out” approach.

In another embodiment of the present invention, the operating system is obtained directly from text an application places in a packet. This text is referred to as a banner. For example, some telnet and file transfer protocol (FTP) servers display a banner that reflects the actual operating system.

Not many well-used applications exist that explicitly detail the operating system in the banner; however, there are a multitude of applications whose banners reveal the exact application and version information. These may be used as contributing piece of evidence for chronological assessment between the application and operating system. For instance, if it is discovered that Internet information Service (IIS) 6.0 is running on the host, it is known that it requires a Windows™ 2003 server and nothing pre-dating Windows 2003™. This method useful if the number of applications is restricted to commonly used ones that can provide specific information about the native operating system.

In another embodiment of the present invention, the operating system is obtained or eliminated indirectly by examining operating system and application combinations. For example, if the operating system has been identified on a host via client or server TCP fingerprinting as a UNIX variant, but the Internet information Service (IIS) is also running on that host, the TCP fingerprinting identification is incorrect. In this case, application identification takes precedence over TCP fingerprint identification.

In another embodiment of the present invention, offered ports or port groups are used to identify an operating system. There are unique instances where a particular service or listening port assists in operating system identification. For example, TCP port 1508 appears to be listening on HP-UX hosts only and TCP port 407 appears to be listening on MAC OS hosts. For this method of identification to be practical and useful, the ports that are examined must be exclusive to one particular operating system or a small set of possible operating systems. There is little to be gained from the use of something like NetBIOS/SMB ports since they have cross-platform support.

Port groups also identify operating systems. For example, Windows™ operating systems beginning with Windows 2000™ enable TCP ports 135, 139, and 445 and a modern version of Linux will enable TCP ports 22, 111, 515, 948, and 6000.

The absence of support for a particular port or port group may supply concomitant indicate an operating system as well. For example, if it is not possible to tell if a given host is a Windows™ variant or Linux variant running SMB, the absence of support for a secure shell server on port 22 would logically indicate a Windows™ classification since most default Linux installs enable port 22.

In another embodiment of the present invention, the use of a port is used to eliminate previous versions of operating systems. For example, TCP port 445 was first used by Windows 2000™ hosts. Earlier versions are, then, eliminated from consideration.

Services Identification

In another embodiment of the present invention, a service on a host is identified from its data. Services are generally served on well-known ports of a host. It is possible for an administrator or an unauthorized user acting as an administrator, however, to configure a system to bind services to alternate ports. It is also possible for a machine infected with a virus to bind services to non-standard ports. For this reason it is necessary to validate a service based on its data rather than its port.

Service identification is implemented by overlaying the protocol of a service on the given packet stream and validating the fields and flow of the protocol. The protocol validation is verified using one server packet or many client and server packets depending on the protocol.

An exemplary method of service identification using one server packet is used to identify a domain name server (DNS) service. DNS protocol packet has a structure documented within an Internet request for comments (RFC) document. This structure includes the following requirements. The packet contains at least enough data for a DNS header. The DNS response bit is set. The operation code is within the correct range. The Z flag is clear. The return code is within the correct range. The truncated flag is clear. The response records are then verified for structure and content.

FIG. 15 is a flowchart showing a method 1500 for identifying a service running on a network device from a packet, in accordance with an embodiment of the present invention.

In step 1505 of method 1500, a packet transmitted by the network device on the network is read.

In step 1510, the packet is decoded into one or more protocol fields.

In step 1515, the one or more fields are compared to a service identifying data structure. A service identifying data structure contains predefined protocol fields that identify a service.

In step 1520, a matched service is recorded as the service running on the network device.

An exemplary method of service identification using multiple connections and multiple packets from both the client and the server is used to identify a remote shell (RSHELL) service. The error socket port is extracted and validated from a client packet. A new connection is made from a server to the client connecting to the extracted port. A username and command are read from the client packet and verified to be printable. A server response is verified to be a one-byte packet.

In another embodiment of the present invention, a service is identified directly from the packet. For some services, the service vendor and version can be parsed from the server packets. For example, a hypertext transport protocol (HTTP) header packet contains a “server=” entry followed by the vendor and version separated with a slash character and terminated with a carriage return character.

Some services contain sub services. For example, the remote procedure call (RPC) service maps sub services to various ports. The RPC header contains a field that specifies the sub service type. This field is extracted and represented as a readable string to further define the capabilities of the service.

FIG. 16 is a flowchart showing a method 1600 for identifying a service running on a network device from two or more packets, in accordance with an embodiment of the present invention.

In step 1605 of method 1600, a flow between an initiator network device and a responder network device is identified by reading, decoding, and analyzing two or more packets transmitted on the network.

In step 1610, one or more packets of the flow are identified as one or more initiator packets.

In step 1615, one or more packets of the flow are identified as one or more responder packets.

In step 1620, if protocol fields of the one or more initiator packets match initiator protocol fields of the service and if protocol fields of the one or more responder packets match responder protocol fields of the service, then the service is identified as running on either the initiator network device or the responder network device.

FIG. 17 is a flowchart showing a method 1700 for identifying a service running on a network device by comparing protocol fields of one or more packets from a flow to a service identifying data structure, in accordance with an embodiment of the present invention.

In step 1705 of method 1700, a service identifying data structure is maintained that identifies one or more protocol fields for one or more services.

In step 1710, a flow between an initiator network device and responder network device is identified by reading, decoding, and analyzing two or more packets transmitted on the network.

In step 1715, one or more protocol fields of one or more packets of the flow are compared to one or more protocol fields of one or more services of the service identifying data structure. In one embodiment the service identifying data structure identifies protocol fields from packets sent by both the initiator and the responder.

In step 1720, a matching service is recorded for either the initiator network device or the responder network device. Services are typically found on the responder, but may also be found on the initiator.

In another embodiment of method 1700, one or more services of the service identifying data structure are grouped by port number. A flow port number of the one or more packets of the flow is identified. The one or more protocol fields of one or more packets of the flow are compared to one or more protocol fields of one or more services of the service identifying data structure grouped by the flow port number.

In another embodiment of method 1700, one or more services of the service identifying data structure are grouped by a search pattern. A flow search pattern of one or more packets of the flow is identified. The one or more protocol fields of one or more packets of the flow are compared to one or more protocol fields of one or more services of the service identifying data structure grouped by the search pattern.

Flow Analysis

A flow is a TCP session or a UDP pseudo session. A TCP session is defined as a complete TCP session beginning with the 3-way TCP handshake, followed by data packets, and terminated with TCP tear-down sequence of finished (FIN) flags and acknowledgement (ACK) flags to the FINs. The UDP protocol is a connectionless protocol, which means that there is no connection or tear-down sequence. However, most applications that use UDP pass packets in both directions. In UDP pseudo sessions, the first packet from the client is used to create the session and all packets passed with the same IP addresses and ports are included as part of the session. The UDP session remains active until no session packets are detected for a timeout period.

Each flow is monitored and statistics about the flow a compiled and stored when the flow is terminated. Information available from a flow includes an IP address of the session initiator, an IP address of the session responder, a port of the session initiator, a port of the session responder, a time of the first packet, a time of the last packet, the number of packets sent by the session initiator, the number of packets sent by the session responder, the number of bytes sent by the session initiator, and the number of bytes sent by the session responder.

From this information it is determined what services a client typically uses, which servers a client typically utilizes, how much data a client typically transfers, how much data a server typically serves, how many connections per second a server handles, the server load during different time periods, how much traffic a client generates during different time periods, which servers clients connect to, which clients connect to a server, and what is the typical conversation size between a client and a server.

In one embodiment of the present invention, flow analysis is used to identify hosts, host operating systems, and host services. In an exemplary method of flow analysis, packets entering the flow analyzer are first classified according to the version of the IP protocol. If a packet is IP version 4, the packet is checked to see if it belongs to an existing flow. If a new flow is detected, a flow key is created consisting of the source and destination IP addresses, source and destination ports, and the IP protocol. The new flow is entered into a hash table.

The hash table has a use list and a free list and is different from a standard hash table in that a memory cap is used. Once the memory cap is hit, the hash table will discard flows. The oldest flows are discarded first. A call back function is supplied to allow a flow to be marked for deletion. The hash table performs all necessary memory management.

When a new flow is detected, the packet type determines the flow type (TCP, UDP, IP fragment, etc.). The flow type is used to determine the analysis that is to be performed. For example, if a flow is discovered and the flow type is identified as TCP hosts identification, host operating system identification, and host service identification is performed.

FIG. 18 is a flowchart showing a method 1800 for identifying TCP flow on a network, in accordance with an embodiment of the present invention.

In step 1805 of method 1800, a first packet transmitted on the network is read.

In step 1810, the first packet is decoded into a first plurality of protocol fields.

In step 1815, a first five-tuple and a first SYN bit are identified from the first plurality of protocol fields. A first source IP address, a first destination IP address, a first transport protocol, a first source port, and a first destination port make up the first five-tuple.

In step 1820, a second packet transmitted on the network is read.

In step 1825, the second packet is decoded into a second plurality of protocol fields.

In step 1830, a second five-tuple, a second ACK bit, and a second SYN bit are identified from the second plurality of protocol fields. A second source IP address, a second destination IP address, a second transport protocol, a second source port, and a second destination make up the second five-tuple.

In step 1835, if the first transport protocol is TCP, the second transport protocol is TCP, the first SYN bit is set, the second SYN bit is set, the second ACK bit is set, the first source IP address is the same as the second destination IP address, the second source IP address is the same as the first destination IP address, the first source port is the same as the second destination port, and the second source port is the same as the first destination port, then a third packet that corresponds to either the first five-tuple or the second five-tuple is identified as part of the flow.

In another embodiment of this method, the flow is a session. In another embodiment of this method, the initiator of the first packet is called a client or session initiator. The initiator of the second packet is called a server or session responder.

In another embodiment of this method, the first five-tuple and the second five-tuple are recorded. In another embodiment of this method, a plurality of packets are identified that correspond to the first five-tuple or the second five-tuple.

In another embodiment of this method, the flow is terminated by a FIN bit sent by the session initiator, followed by an ACK bit sent by the session responder, followed by a FIN bit sent by the session responder, and followed by an ACK bit sent by the session initiator.

FIG. 19 is a flowchart showing a method 1900 for identifying UDP flow on a network, in accordance with an embodiment of the present invention.

In step 1905 of method 1900, a first packet transmitted on the network is read.

In step 1910, the first packet is decoded into a first plurality of protocol fields.

In step 1915, a first five-tuple is identified from the first plurality of protocol fields. A first source IP address, a first destination IP address, a first transport protocol, a first source port, and a first destination port make up the first five-tuple.

In step 1920, a second packet transmitted on the network is read.

In step 1925, the second packet is decoded into a second plurality of protocol fields.

In step 1930, a second five-tuple is identified from the second plurality of protocol fields. A second source IP address, a second destination IP address, a second transport protocol, a second source port, and a second destination make up the second five-tuple.

In step 1935, if the first transport protocol is UDP, the second transport protocol is UDP, the first source IP address is the same as the second destination IP address, the second source IP address is the same as the first destination IP address, the first source port is the same as the second destination port, and the second source port is the same as the first destination port, then a third packet that corresponds to either the first five-tuple or the second five-tuple is identified as part of the flow.

In another embodiment of this method, the flow is a session. In another embodiment of this method, the initiator of the first packet is called a client or session initiator. The initiator of the second packet is called a server or session responder.

In another embodiment of this method, the first five-tuple and the second five-tuple are recorded. In another embodiment of this method, a plurality of packets are identified that correspond to the first five-tuple or the second five-tuple.

Confidence Assessment

Another embodiment of the present invention is a method for selecting an operating system of a host from the results of two or more techniques of operating system identification. In this method, each of the two or more techniques of operating system identification is used to identify an operating system on the host and produce a result. Each result is assigned a confidence value, or weight, based on the technique used to produce it. Two or more results are compared, and the result with the highest confidence value is selected as the operating system of the host.

FIG. 20 is a flowchart showing a method 2000 for selecting an operating system of a network device from the results of two or more operating system identification techniques used in a passive network detection system, in accordance with an embodiment of the present invention.

In step 2005 of method 2000, two or more operating system identification techniques are employed to create two or more operating system results.

In step 2010, each of the two or more operating system results is assigned a confidence value.

In step 2015, the confidence values of the two or more operating system results are compared.

In step 2020, the result with a highest confidence value is selected as the operating system of the network device.

In one embodiment of this method, higher confidence values are assigned to techniques of operating system identification that use protocol fields that are difficult to alter or that are not typically modified. For example, it is difficult to alter the chronological order of TCP options. Also, it is unlikely that timestamps have been modified to contain zero values.

In another embodiment of this method, confidence values are assigned based on a statistical formula. In another embodiment of this method, confidence values are assigned based on a decision-tree.

In another embodiment of this method, confidence values are assigned based on information gathered over time. This is required for situations such as dual boot systems or even the case where subsequently learned services or observed TCP packet values render valuable new information. An assessment method based on gathered information is capable of responding to conflicting data rather than simply attempting to confirm a behavior.

There are some observed behaviors that are individually unique enough to identify an operating system with a high degree of confidence. TCP timestamps with a zero value in both sent and received times on the SYN or SYN/ACK are a telltale sign of Windows™ operating systems. Certain versions of Solaris™ have the TCP option maximum segment size as the last or not the first option in a SYN/ACK packet. All other observed operating system behaviors set the maximum segment size as the first TCP option in the SYN/ACK packet. Linux 2.4 hosts by default usually respond to a SYN packet with a timestamp TCP option by sending a SYN/ACK packet that supports the timestamp. However, when the stimulus SYN packet is a Windows™ host that has zero timestamps, the response SYN/ACK does not support the timestamp.

In another embodiment of the present invention, a host is actively scanned to enhance the confidence assessment. This technique is used when the target operating system is not clear, and a stimulus packet may cause a host to respond in a manner that better identifies itself. For example, actively scanning with Internet control message protocol (ICMP) or UDP stimulus, such as used by nmap and xprobe utilities, provides identifying characteristics in a response. Alternatively, unlike the nmap or xprobe utilities, a small number of packets are sent to a host in order to distinguish its operating between one of two choices. This is more efficient than passively monitoring traffic for distinguishing characteristics protocols such as ICMP.

Another embodiment of the present invention is a method for selecting a service running on a host from the results of two or more techniques of service identification. In this method, each of the two or more techniques of service identification is used to identify a service running on the host and produce a result. Each result is assigned a confidence value, or weight, based on the technique used to produce it. Two or more results are compared, and the result with the highest confidence value is selected as the service running on the host.

FIG. 21 is a flowchart showing a method 2100 for selecting a service of a network device from the results of two or more service identification techniques used in a passive network detection system, in accordance with an embodiment of the present invention.

In step 2105 of method 2100, two or more service identification techniques are employed to create two or more service results.

In step 2110, each of the two or more service results is assigned a confidence value.

In step 2115, the confidence values of the two or more service results are compared.

In step 2120, the result with a highest confidence value is selected as the service of the network device.

In another embodiment of the present invention, the confidence value of an operating system result or service result is determined by considering if each subsequent result matches that result. An initial confidence value is assigned as the confidence value of a result. The previous confidence value of the result is initially set to zero. One half of the absolute value of the difference between the confidence value and the previous confidence value is added to the confidence value for each successive match. This is the confirming increment value. For example, if a result is initially assigned a confidence value of 50, four successive matches have confidence values of 75, 87, 93, and 96, respectively.

Each non-match or different match subtracts from the confidence value. The amount subtracted for each non-match is the detracting increment value. The detracting increment value is one half of the confirming increment value. For example, if confidence is 75 with a confirm value of 12 and the next point does not match, the confidence value is 69. On each successive non-match the detracting increment value is doubled. If the detraction points come from the same IP address, the detracting increment value is reduced by a factor of 4.

FIG. 22 is a flowchart showing a method 2200 for determining the confidence value of a result of an operating system or a service by considering previous results obtained by more than one identification technique used in a passive network detection system, in accordance with an embodiment of the present invention.

In step 2205 of method 2200, a result is identified from a first one or more packets by an identifying technique.

In step 2210, if the result is equivalent to a previous result, a confirming increment value is added to the confidence value of the previous result to produce a confidence value of the result. The confirming increment value is calculated as one half the absolute value of the difference between the confidence value of the previous result and the confidence value of the result.

In step 2215, if the result is not equivalent to a previous result, a detracting increment value is calculated as one half of the confirming increment value and the detracting increment value is subtracted from the confidence value of the previous result to produce the confidence value of the result.

In step 2220, a subsequent result is identified from a second one or more packets by another identifying technique.

In step 2225, if the subsequent result is equivalent to the result, the confirming increment value is calculated as one half an absolute value of a difference between the confidence value of the previous result and the confidence value of the result, and the confirming increment value is added to the confidence value of the result to produce a confidence value of the subsequent result.

In step 2230, if the subsequent result is not equivalent to the result and the result is not equivalent to a previous result, the detracting increment value is doubled and the detracting increment value is subtracted from the confidence value of the result to produce the confidence value of the subsequent result.

In step 2235, if the subsequent result is not equivalent to the result and the result is equivalent to a previous result, the detracting increment value is calculated as one half of the confirming increment value and the detracting increment value is subtracted from the confidence value of the result to produce the confidence value of the subsequent result.

For operating system fingerprinting methods, the maximum confidence value is scaled by the number of hops from the location at which packets are detected. The maximum confidence value is the difference between one hundred and twice the number of hops. The minimum maximum confidence value is fifty. The confirming increment value is also scaled by the number of hops from the location at which packets are detected. The confirming increment value is divided by one half the number of hops. The detracting increment value is not dependent on the number of hops from the location at which packets are detected. The minimum confirming increment value and the minimum detracting increment value is one.

Vulnerability Analysis

In another embodiment of the present invention, vulnerabilities are assigned to hosts discovered on a network. Vulnerabilities are known methods of maliciously gaining access to a host or host service, or maliciously attacking a host or host service. The vulnerabilities assigned to a host are derived from various sources. IDSs for example, maintain vulnerability lists.

A list of potential vulnerabilities is stored in a vulnerabilities database (VDB). When a host or host service is identified, one or more vulnerabilities from the VDB is mapped in real-time to the host or host service. These vulnerabilities are then displayed in a graphical user interface, linked to the particular host or service. An administrator, uses this information to patch specific systems or groups of systems.

Mapping vulnerabilities requires a normalized VDB. This database lists known vulnerabilities, mapping each one to the appropriate host operating system or service. It also requires that operating system and service fingerprints are normalized to values stored in the VDB.

Vulnerability lookups are performed real-time. As the information about a host is gathered and the host profile for the system is updated, the vulnerability lookup is also refined to take into account any new or changed data. An exemplary VDB contains a list of vulnerabilities pulled from an IDS. In order for lookups to be performed into this database, the data is first normalized. This means that every product and vendor referenced in a vulnerability is listed in the database exactly once, and all vulnerabilities that reference this product or vendor point to the same record. Dependencies are also listed. If a vulnerability occurs for a specific application but only for a specific operating system, this relationship is itemized.

When operating system fingerprints are derived, they are mapped against the normalized operating system information in the VDB. If a fingerprint matches multiple possible operating systems, multiple mappings are created. When an operating system on a particular host is identified, a vulnerability lookup is performed to map to this host the vulnerabilities for this operating system.

In another embodiment of the present invention, operating system fingerprints are configurable. A utility is provided which allows users to select an operating system fingerprint definition from a host on their network. This tool prompts the user to select appropriate operating system mappings from the VDB. This tools allows users to customize the fingerprints and tailor the vulnerability lookups for the specific host types on their networks.

As with operating system fingerprints, service fingerprints are also mapped against the normalized product information in the VDB. The service type, name, vendor, and version are derived from the protocol. A dynamic mapping is created, based on a service type, a regular expression string matching of the product name, a vendor name, and a version, to products in the VDB. Once the service is mapped, a vulnerability lookup is performed. Any operating system or other service dependencies are handled at this time, such that only vulnerabilities that match all criteria are mapped.

In another embodiment of the present invention, a discovered host is actively scanned using vulnerabilities assigned from the VDB. In this way, the list of vulnerabilities for that host is refined from a list of all possible vulnerabilities to a smaller set of core vulnerabilities that an administrator must worry about. This elimination of vulnerabilities along with the lowering of the priority of vulnerabilities that have either already been patched on the target system or vulnerabilities that are not currently present due to the configuration of the service, allows the administrator to target efforts to resolve these vulnerabilities to the most critical problem areas.

FIG. 23 is a flowchart showing a method 2300 for assigning a vulnerability to a network device on a network based on the operating system the network device is using, in accordance with an embodiment of the present invention.

In step 2305 of method 2300, a vulnerability of an operating system is predefined.

In step 2310, the operating system the network device is using is determined by reading, decoding, and analyzing a packet transmitted on the network.

In step 2315, the vulnerability of the operating system the network device is using is assigned to the network device.

FIG. 24 is a flowchart showing a method 2400 for assigning a vulnerability to a network device on a network based on the service the network device is running, in accordance with an embodiment of the present invention.

In step 2405 of method 2400, a vulnerability of a service is predefined.

In step 2410, the service the network device is running is determined by reading, decoding, and analyzing a packet transmitted on the network.

In step 2415, the vulnerability of the service the network device is running is assigned to the network device.

FIG. 25 is a flowchart showing a method 2500 for creating a normalized vulnerabilities database for use in a passive network detection system, in accordance with an embodiment of the present invention.

In step 2505 of method 2500, a list of predefined vulnerabilities is gathered, where each vulnerability has at least one operating system name or service name.

In step 2510, one or more operating system groups are created from the list, where each of the operating system groups has one or more vulnerabilities that list one or more operating system names that identify a unique operating system.

In step 2515, a single operating system identifier is assigned to each operating system group.

In step 2520, lookup is provided from the passive network detection system to the operating system groups by the single operating system identifier.

In step 2525, one or more service groups are created from the list of vulnerabilities, where each of the service groups has one or more vulnerabilities that have one or more service names that identify a unique service.

In step 2530, a single service identifier is assigned to each of the service groups.

In step 2535, lookup is provided from the passive network detection system to the service groups by the single service identifier.

Policy Analysis and Alerting

In another embodiment of the present invention, information passively discovered on a network is used to enforce a network configuration and usage policy. An action is performed if a usage policy is violated. Exemplary actions include alerting the user and denying network access based on the type of information discovered or when that information was discovered.

One exemplary usage policy is the prevention of unauthorized operating system usage. An action is triggered if a discovered operating system does not match the allowable operating system for the given IP address. For example, a user specifies that only Windows 2000™ and Windows XP™ may be used on the network. If a host with any other operating system detected, an alert would be generated and the offending host would be blocked at the firewall.

Another exemplary usage policy is the prevention of unauthorized service usage. An action is triggered if a prohibited service is detected. For example, the user specifies that service A is not permitted on subnet X. If service A is detected on subnet X, an alert is generated. In another example, a user specifies that for subnet Z, Linux is the only permitted operating system. Additionally, the only permitted services are secure shell (SSH) and secure sockets layer (SSL). An exception is made to allow host X to additionally run HTTP. Also, host Y is allowed to run Windows™ 2003 Server with no service restrictions. Any violations of this policy generates an alert.

Another exemplary usage policy is the qualification of events. The criticality of an alert is adjusted based on information gathered from multiple sources. For example, if an attack that only affects IIS is detected and the host is a Windows™ system running IIS, a critical alert is generated. If an attack that only affects IIS is detected and the host is a Linux system, which cannot run IIS, an informational alert is generated.

Another exemplary usage policy is defining a threshold for a single event. An action is triggered upon detecting multiple events of the same type within a given time period. For example, if ten failed login attempts to a single service are detected within a thirty second time period, an alert is generated to indicate a brute force login attempt. In another example, if fifteen failed login attempts followed by a successful login to a single service are detected within a forty-five second time period, an alert is generated to indicate a successful brute force login and the client system is blocked at the firewall.

Another exemplary usage policy is detecting IDS event sequences. An action is triggered upon detecting multiple events in a given sequence within a given time period. For example, the sequence of events E, F, and G destined for a single host is indicative of a successful compromise of a host. Individually, none of the events is considered critical and are ignored. However, when occurring sequentially within a 60 second time period they represent a critical event and generate a critical alert.

In another example, a buffer overflow attack is detected against a host and within 5 minutes a new telnet server is detected on the host. A critical alert is generated and the firewall blocks all traffic to and from the host.

Another exemplary usage policy is maintaining temporal constraints. An action is triggered upon detecting sessions established during prohibited times. For example, normal virtual private network (VPN) connections occur between the hours of 7:00 AM and 9:00 PM EST. A connection initiated at 2:00 AM generates an alert.

Another exemplary usage policy is maintaining statistical constraints. An action is triggered upon detecting deviations from normal operating parameters. For example, a web server that normally serves 30000 hits per hour is currently serving 5 hits per hour. An alert is generated.

Additional policy response actions include event logging to a local database, system logging a service message, performing a simple network management protocol (SNMP) trap, generating an e-mail message, controlling a network device (e.g. invoke a firewall rule or disable a network switch port), and raise or lower the priority of an IDS event.

The user configures a policy. The policy consists of a list of rules and groups of rules. Each rule and group of rules can be associated with a set of response actions. Each rule can be activated to become part of the active policy. As the nodes on the monitored networks change, events are generated to reflect the changes. If a new service is detected on a host, an event is generated that contains the new service information. The events and the data contained within the events are evaluated against the currently active policy. If the event or the data within the event causes the rule to fail, an event is generated that triggers the configured responses. If a node changes to the Windows™ operating system and a policy is written that prohibits the Windows™ operating system is in effect with an e-mail response action configured, an e-mail message is generated containing the event data and rule ID.

FIG. 26 is a flowchart showing a method 2600 for enforcing a network configuration and usage policy based on an operating system using a passive network detection system, in accordance with an embodiment of the present invention.

In step 2605 of method 2600, the network configuration and usage policy for an operating system is predefined.

In step 2610, the operating system used by the network device on the network is determined by reading, decoding, and analyzing a packet transmitted on the network.

In step 2615, an action identified by the network configuration and usage policy for the operating system is performed.

FIG. 27 is a flowchart showing a method 2700 for enforcing a network configuration and usage policy based on a service using a passive network detection system, in accordance with an embodiment of the present invention.

In step 2705 of method 2700, the network configuration and usage policy for a service is predefined.

In step 2710, the service used by the network device on the network is determined by reading, decoding, and analyzing a packet transmitted on the network.

In step 2715, an action identified by the network configuration and usage policy for the service is performed.

FIG. 28 is a schematic diagram illustrating a passive network detection system, in accordance with an embodiment of the present invention.

In system 2800, packet 2805 is read by packet reader 2810. Packet decoder 2815 decodes packet 2805. Flow analyzer 2820 identifies a flow from two or more decoded packets. Flow analyzer 2820 also maintains flow statistics. Operating system detector 2825 receives decoded packets from flow analyzer 2820, detects one or more operating systems using one or more identification techniques, and selects an operating system from the one or more operating systems using confidence assessment. Service detector 2830 receives decoded packets from operating system detector 2825, detects an one or more services using one or more identification techniques, and selects a service from the one or more operating systems using confidence assessment. Network change monitor 2835 monitors network device operating system and service changes. Host representation monitor 2840 monitors changes to operating systems and services detected on the network. Normalized vulnerability list 2845 groups vulnerabilities by operating system and service and provides vulnerabilities to host representation monitor. Host representation storage 2850 stores operating system and service information that is detected and sends information to and receives information from host representation monitor 2840. Flow analysis data storage 2855 receives the flow statistics gathered by flow analyzer 2820. Policy component 2860 enforces network configuration rules based on information received from host representation storage 2850 and information received from flow analysis data storage 2855. Network topology component 2865 identifies routers on the network. Mapping component 2870 assigns detected network devices to subnets. Results reporter 2875 reports policy, network topology, and mapping information to a network reporting mechanism.

In accordance with an embodiment of the present invention, instructions adapted to be executed by a processor to perform a method are stored on a computer-readable medium. The computer-readable medium can be a device that stores digital information. For example, a computer-readable medium includes a read-only memory (e.g., a Compact Disc-ROM (“CD-ROM”) as is known in the art for storing software. The computer-readable medium can be accessed by a processor suitable for executing instructions adapted to be executed. The terms “instructions configured to be executed” and “instructions to be executed” are meant to encompass any instructions that are ready to be executed in their present form (e.g., machine code) by a processor, or require further manipulation (e.g., compilation, decryption, or provided with an access code, etc.) to be ready to be executed by a processor.

Embodiments of the present invention relate to data communications via one or more networks. The data communications can be carried by one or more communications channels of the one or more networks. A network can include wired communication links (e.g., coaxial cable, copper wires, optical fibers, a combination thereof, and so on), wireless communication links (e.g., satellite communication links, terrestrial wireless communication links, satellite-to-terrestrial communication links, a combination thereof, and so on), or a combination thereof. A communications link can include one or more communications channels, where a communications channel carries communications.

A system and method in accordance with an embodiment of the present invention disclosed herein can advantageously improve existing intrusion detection systems or real-time network reporting mechanisms by giving them contextual information about a computer network. Such a system and method is particularly advantageous in comparison to manual methods in that its information is updated automatically. The ability of the present invention to discover the operating systems of both servers and clients is an important advantage over conventional network detection systems. It is advantageous in comparison to active scanning systems in that it is not destructive to the network, it can provide relevant information to an IDS and its information is always up to date. It can be used to provide information to enhance intrusion detection systems or to provide continuous real-time reports of the status of the network. It can discover the operating systems of both servers and clients.

In the foregoing detailed description, systems and methods in accordance with embodiments of the present invention have been described with reference to specific exemplary embodiments. Accordingly, the present specification and figures are to be regarded as illustrative rather than restrictive. The scope of the invention is to be further understood by the claims, and by their equivalents. 

1. A method for passively and automatically assigning a vulnerability to a network device on a network, comprising: predefining a vulnerability of an operating system in a vulnerability data structure that lists vulnerabilities mapped to one record for each corresponding operating system and lists operating system fingerprints mapped to the one record for the each corresponding operating system; passively determining that the network device is using one of plural operating systems by reading a packet transmitted on the network, decoding the packet, first mapping the operating system fingerprint based on fields in the decoded packet to the plural operating systems listed in the vulnerability data structure, and then second mapping each of the plural operating systems listed in the vulnerability data structure to a corresponding vulnerability listed in the vulnerability data structure, wherein the second mapping is responsive to the first mapping, wherein the packet is in traffic passively moving across the network; and assigning the corresponding vulnerabilities of the plural operating systems from the vulnerability data structure to the network device.
 2. The method of claim 1, wherein predefining the vulnerability of the operating system comprises reading a rule from an intrusion detection system.
 3. The method of claim 1, wherein assigning the vulnerabilities of the plural operating systems to the network device comprises recording the vulnerability in a host representative data structure of the network device.
 4. The method of claim 1, further comprising reporting the vulnerabilities assigned to the network device, to a network reporting mechanism.
 5. The method of claim 4, wherein the network reporting mechanism comprises one or more of an intrusion detection system and a network management system.
 6. The method of claim 1, further comprising actively scanning the network device using the vulnerability after the vulnerability is assigned to the network device.
 7. A method for passively and automatically assigning a vulnerability to a network device on a network, comprising: predefining a vulnerability of a service in a vulnerability data structure that lists vulnerabilities mapped to one record for each corresponding service and lists service fingerprints mapped to the one record for the each corresponding service; passively determining that the network device is running one of plural services by reading one or more packets transmitted on the network, decoding the one or more packets, first mapping the service fingerprint based on fields in the decoded packets to the plural services listed in the vulnerability data structure, and then second mapping each of the plural services listed in the vulnerability data structure to a corresponding vulnerability listed in the vulnerability data structure, wherein the second mapping is responsive to the first mapping, wherein the packet is in traffic passively moving across the network; and assigning the corresponding vulnerabilities of the plural services from the vulnerability data structure to the network device.
 8. The method of claim 7, wherein predefining the vulnerability of the service comprises reading a rule from an intrusion detection system.
 9. The method of claim 7, wherein assigning the vulnerabilities of the plural services to the network device comprises recording the vulnerabilities in a host representative data structure of the network device.
 10. The method of claim 7, further comprising reporting the vulnerabilities assigned to the network device, to a network reporting mechanism.
 11. The method of claim 10, wherein the network reporting mechanism comprises one or more of an intrusion detection system and a network management system.
 12. The method of claim 7, further comprising actively scanning the network device using the vulnerability after the vulnerability is assigned to the network device.
 13. A method for creating a normalized vulnerabilities database for use in a passive network detection system, comprising: gathering a list of predefined vulnerabilities, wherein each vulnerability comprises one or more of an operating system name and a service name; creating one or more operating system groups from the list, wherein each one or more operating system groups comprises one or more vulnerabilities that comprise one or more operating system names that identify a same unique operating system; assigning a single operating system identifier to the each one or more operating system groups; providing lookup from the passive network detection system to the each one or more operating system groups by the single operating system identifier; mapping an operating system fingerprint from fields in a passively received packet to plural operating systems; assigning the corresponding vulnerabilities of the plural operating systems from the operating system groups as the operating-system-vulnerabilities for a host that generated the packet; creating one or more service groups from the list, wherein each one or more service groups comprises one or more vulnerabilities that comprise one or more service names that identify a unique service; assigning a single service identifier to the each one or more service groups; providing lookup from the passive network detection system to the each one or more service groups by the single service identifier; mapping a service fingerprint from the fields in the passively received packet to plural services; assigning the corresponding vulnerabilities of the plural services from the service groups as the service-vulnerabilities for the host that generated the packet; and eliminating, as possible vulnerabilities for the host that generated the packet, vulnerabilities which are not assigned as both the operating-system-vulnerabilities and the service-vulnerabilities.
 14. The method of claim 13, further comprising providing lookup from the passive network detection system to the intersection of the each one or more operating system groups and the each one or more service groups by the single operating system identifier and the single service identifier.
 15. The method of claim 13, wherein gathering the list of predefined vulnerabilities comprises reading one or more rules from an intrusion detection system.
 16. The method of claim 13, wherein the single service identifier comprises one or more of a service type, a regular expression of a service product name, a vendor name, and a version.
 17. The method of claim 13, wherein the single operating system identifier comprises one or more of a regular expression of an operating system product name, a vendor name, and a version.
 18. The method of claim 13, wherein the lookup from the passive network detection system to the each one or more operating system groups by the single operating system identifier is performed by the passive network detection system when an operating system matching the single operating system identifier is detected.
 19. The method of claim 13, wherein the lookup from the passive network detection system to the each one or more service groups by the single service identifier is performed by the passive network detection system when a service matching the single service identifier is detected.
 20. The method of claim 13, further comprising providing lookup to a list of one or more single operating system identifiers, wherein a single operating system identifier from the list of one or more single operating system identifiers is manually selected for assignment to a network device detected by the passive network detection system. 