Computer Science ›› 2018, Vol. 45 ›› Issue (12): 24-31.doi: 10.11896/j.issn.1002-137X.2018.12.004

• Surveys • Previous Articles     Next Articles

Research on Network Asset Detection Technology

WANG Chen-dong, GUO Yuan-bo, ZHEN Shuai-hui, YANG Wei-chao   

  1. (Strategic Support Force University of Information Engineering,Zhengzhou 450001,China)
    (State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450001,China)
  • Received:2017-11-30 Online:2018-12-15 Published:2019-02-25

Abstract: With the rapid spread of network technology,large numbers of diversified network assets bring great conve-nience to people’s daily life,but challenges are also posed to their own safety management at the same time.Accurate and comprehensive network asset detection is the prerequisite for the effective management of network assets and the basis for threat analysis.First,this paper reviewed the origin and development process of network asset detection.Next,this paper comprehensively analyzed three common novel methods of network asset detection (active,passive and search engine based)and each key technologies,and summarized the characteristics of these methods respectively.Finally,this paper discussed the development trends and further research directions of this technology.

Key words: Asset detection, Fingerprint identification, Network scanning, Search engine

CLC Number: 

  • TP393.0
[1]International Organization for Standardization.ISO/IEC 13335-1:2004 .https://www.iso.org/standard/39066.html.
[2]SANDERS C,SMITH J.Applied Network Security Monitoring:Collection,Detection,and Analysis.Syngress Publishing,2013:3-5.
[3]HAUKELI J.False positive reduction through IDS networkawareness.Oslo:University of OSLO,2012.
[4]YE Z Y,GUO Y B,WANG C D,et al.Survey on application of attack graph technology.Journal on Communications,2017,38(11):121-132.(in Chinese)
叶子维,郭渊博,王宸东,等.攻击图应用研究综述.通信学报,2017,38(11):121-132.
[5]吴灏.网络攻防技术.北京:机械工业出版社,2009:10-14.
[6]SCOTT A,JAY H,GREG K,et al.Spiceworks homepage.https://www.spiceworks.com.
[7]BORANBAYEV A S.Defining methodologies for developingJ2EE web-based information systems.Nonlinear Analysis Theory Methods & Applications,2009,71(12):e1633-e1637.
[8]LAUFER K.A Hike through Post-EJB J2EE Web Application Architecture.Computing in Science & Engineering,2005,7(5):80-88.
[9]LYON G F.Nmap Network Scanning:The Official Nmap Project Guide to Network Discovery and Security Scanning.Insecure,2009.
[10]YAROCHKIN F V,ARKIN O,KYDYRALIEV M,et al.Xprobe2++:Low volume remote network information gathering tool∥IEEE/IFIP International Conference on Dependable Systems & Networks.IEEE,2009:205-210.
[11]SHAMSI Z,NANDWANI A,LEONARD D,et al.Hershel:Single-Packet OS Fingerprinting.IEEE/ACM Transactions on Networking,2016,24(4):2196-2209.
[12]SHAMSI Z,LOGUINOV D.Unsupervised Clustering UnderTemporal Feature Volatility in Network Stack Fingerprinting.IEEE/ACM Transactions on Networking,2016,PP(99):1-14.
[13]GARCIA S.DNmap:the distributed nmap.http://mateslab.weebly.com/dnmap-the-distributed-nmap.html.
[14]DURUMERIC Z,WUSTROW E,HALDERMAN J A.ZMap:fast internet-wide scanning and its security applications∥Usenix Conference on Security.San Jose:USENIX Association,2013:605-620.
[15]GRAHAM R D.Masscan:the entire Internet in 3 minutes .http://blog.errat asec.com/2013/09/masscanentire-internet-in-3-minutes.html?utm_source=tuicool&utm_medium=referral#.V9AqVLG8rzI.
[16]ADRIAN D,DURUMERIC Z,SINGH G,et al.Zippier ZMap:internet-wide scanning at 10 Gbps∥8th USENIX Workshop on Offensive Technologies (WOOT 14).2014.
[17]ZALEWSKI M.p0f v3:Passive fingerprinter .http://lcamtuf.coredump.cx/p0f3.
[18]BARNES J,CROWLEY P.k-p0f:a high-throughput kernelpassive os fingerprinter∥Proceedings of the Ninth ACM/IEEE Symposium on Architectures for Networking and Communications Systems.IEEE Press,2013:113-114.
[19]CHEN J,WAN Y P,CHEN H,et al.Research on High-Performance Operating System Detection Method.Journal of University of South China (Science and Technology),2016,30(1):66-70.(in Chinese)
陈军,万亚平,陈虹,等.高性能操作系统检测方法研究.南华大学学报(自然科学版),2016,30(1):66-70.
[20]FJELLSKAL E.Passive real-time asset detection system.http://gamelinux.github.io/pr ads.
[21]SHELTON M.Passive asset detection system.ht-tp://passive.sourceforge.net/about.php.
[22]FALCH P B.Investigating passive operating system detection.University of OSLO Department of Informatics,2011.
[23]KOLLMANN E.Chatter on the Wire:How Excessive Network Traffic Gives Away Too Much! .http://chatteronthewire org.
[24]HJELMVIK.Networkminer homepage.http://net-workminer.sourceforge.net.
[25]WANG C D,GUO Y B,HUANG W.Non-intrusive Network Security Scanning Technology.Information Security and Communications Privacy,2016(9):67-72.(in Chinese)
王宸东,郭渊博,黄伟.非入侵式网络安全扫描技术研究.信息安全与通信保密,2016(9):67-72.
[26]HUANG C.Research and Practice of Vulnerability ScanningTechnology Based on GHDB .Beijing:Beijing Jiaotong University,2012.(in Chinese)
黄超.基于GHDB的漏洞扫描技术的研究与实践.北京:北京交通大学,2012.
[27]MATHERLY J.Shodan tool.https://www.shodan.io.
[28]DURUMERIC Z,ADRIAN D,MIRIAN A,et al.A Search Engine Backed by Internet-Wide Scanning∥ACM Sigsac Conference on Computer and Communications Security.Colorado:ACM,2015:542-553.
[29]404 Team from Knownsec.ZoomEye search engine.https://www.zoomeye.org.
[30]DUGGAN D P.Penetration Testing of Industrial Control Systems.Sandia National Lab,2005:5-7.
[31]GENGE B,GRAUR F,ENÂCHESCU C.Non-intrusive Techniques for Vulnerability Assessment of Services in Distributed Systems.Procedia Technology,2015,19:12-19.
[32]MATHERLY J.Complete Guide to Shodan.http://leanpub.com.
[33]LAB B.Report on the Organizational Behavior of Key Infra-structure Information Collection in Cyberspace.(2016-05-03) .http://plcscan.org/blog/wpcontent/uploads/2016/06/ics-security-research-report-2016-05.pdf.
[34]李瑞民.网络扫描技术揭秘.北京:机械工业出版社,2012:1-18.
[35]MYERS D,FOO E,RADKE K.Internet-wide scanning taxonomy and framework∥Proceedings of Australasian Information Security Conference (ACSW-AISC).Australian Computer Society,Inc,2015.
[36]周涛.网络安全中的数据挖掘技术.北京:清华大学出版社,2017:162-167.
[37]PHILIP C S.IDS-based Passive Asset Detection:Using and extending an IDS for asset detection .University of OSLO Department of Informatics,2014.
[38]Cisco.Introduction to cisco ios netflow .http://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-netflow/index.html.
[39]KLEPSLAND M E.Passive Asset Detection using NetFlow.University of OSLO Department of Informatics,2012.
[40]PAXSON V.Bro:a system for detecting network intruders in real-time.Computer Networks,1999,31(23-24):2435-2463.
[41]AUFFRET P,SINF P.Unification of active and passive opera-ting system fingerprinting.Journal of Computer Virology and Hacking Techniques,2010,6(3):197-205.
[42]BEVERLY R.A Robust Classifier for Passive TCP/IP Fingerprinting∥Passive and Active Network Measurement,International Workshop.DBLP,2004:158-167.
[43]SARRAUTE C,BURRONI J.Using Neural Networks to improve classical Operating System Fingerprinting techniques.Computer Science,2008,8(1):35-47.
[44]AL-SHEHARI T,SHAHZAD F.Improving Operating System Fingerprinting using Machine Learning Techniques.International Journal of Computer Theory & Engineering,2014,6(1):57-62.
[45]TYAGI R,PAUL T,MANOJ B S,et al.Packet Inspection for Unauthorized OS Detection in Enterprises.IEEE Security & Privacy Magazine,2015,13(4):60-65.
[46]ZOU T Z,LI Y,ZHANG B F,et al.Operating system recognition based on support vector machines .Journal of Tsinghua University (Natural Science Edition),2009(s2):2164-2168.(in Chinese)
邹铁铮,李渊,张博锋,等.基于支持向量机的操作系统识别方法.清华大学学报(自然科学版),2009(s2):2164-2168.
[47]CHEN S B,HU Y.Operating System Recognition based on Singular Value Decomposition and DAG_SVMS.Information Security and Communications Privacy,2013(9):66-67.(in Chinese)
程书宝,胡勇.基于奇异值分和DAG_SVMS的操作系统类型识别.信息安全与通信保密,2013(9):66-67.
[48]YI Y H,LIU H F,ZHU Z X.Research of Passive OS Recognition Based on Decision Tree .Computer Science,2016,43(8):79-83.(in Chinese)
易运晖,刘海峰,朱振显.基于决策树的被动操作系统识别技术研究.计算机科学,2016,43(8):79-83.
[49]SIMON K,MOUCHA C,KELLER J.Contactless Vulnerability Analysis using Google and Shodan .Journal of Universal Computer Science,2017,23(4):404-430.
[50]GENGE B,HALLER P,ENÂCHESCU C.Beyond InternetScanning:Banner Processing for Passive Software Vulnerability Assessment.International Journal of Information Security Science,2015,4(3):81-91.
[1] LI Shao-hui, ZHANG Guo-min, SONG Li-hua, WANG Xiu-lei. Incomplete Information Game Theoretic Analysis to Defend Fingerprinting [J]. Computer Science, 2021, 48(8): 291-299.
[2] CHEN Hao, TAO Chuan-qi and WEN Wan-zhi. Research on Quality Evaluation Approaches for Search Function of Online Shopping Platforms [J]. Computer Science, 2017, 44(11): 125-133.
[3] MEI Yuan, ZHAO Bo and ZHU Zhi-dan. Fingerprint Enhancement Based on Straight-curved Line Gabor Filter [J]. Computer Science, 2016, 43(Z6): 149-151.
[4] ZHU Zhi-dan, MA Tin-huai and MEI Yuan. Fingerprint Classification Approach Based on Orientation Descriptor [J]. Computer Science, 2016, 43(Z11): 179-182.
[5] Ibrayim·OSMAN and WANG Yue. Uniform Converting Mechanism for Cross-characters Search Engine of Uyghur [J]. Computer Science, 2016, 43(Z11): 77-82.
[6] YANG Xia, LIU Zhi-wei and LEI Hang. Research and Implementation of Fingerprint Identification Security Technology Based on ARM TrustZone [J]. Computer Science, 2016, 43(7): 147-152.
[7] BAI Liang, YU Tian-yuan, LIU Shi, LAO Song-yang and YANG Zheng. Ranking Algorithm of Search Engine Using Improved Spectral Clustering [J]. Computer Science, 2016, 43(10): 220-224.
[8] ZHANG Ke-jun, REN Peng, QIAN Rong, JU Rong-bin, JIANG Chen and ZHANG Guo-liang. Construction of One Kind of Full-text Searching & Recommending System Based on Clustering [J]. Computer Science, 2015, 42(Z6): 489-490.
[9] YANG Rui-da, XIA Shao-jie and TANG Yi-ping. Research on Key Technologies of 3D Fingerprint Based on Monocular Multi-view Machine Vision [J]. Computer Science, 2015, 42(Z6): 184-189.
[10] CHEN Li-hui,SU Wei,CAI Chuan and CHEN Xiao-yun. Research of Extraction Method of Web Mathematical Formula Based on LaTex [J]. Computer Science, 2014, 41(6): 148-154.
[11] XU Yao,ZHAO Zheng-wen,CHEN Qun,LIU Hai-long,DU Jing,HU Jia-qi and LI Zhan-huai. Graph-based Web Entity Ranking Method [J]. Computer Science, 2014, 41(5): 219-222.
[12] LIU Sheng-jiu, LI Tian-rui, JIA Zhen and JING Yun-ge. Research and Application of Similarity Based on Search Engine [J]. Computer Science, 2014, 41(4): 211-214.
[13] QIU Yun-fei,BAO Li and SHAO Liang-shan. Term Importance Identification Method Based on Classification [J]. Computer Science, 2013, 40(11): 242-247.
[14] . Site Deep-digger System Based on Internet Client Psychology Mining [J]. Computer Science, 2012, 39(11): 187-190.
[15] . Algorithm to Extract Search Suggested Keyword Based on Apriori [J]. Computer Science, 2012, 39(11): 145-148.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!