Vafa Izadinia - Profile on Academia.edu (original) (raw)

Maritza Johnson related author profile picture

Rakesh Prajapati related author profile picture

misheel misheel related author profile picture

Adrian Popescu related author profile picture

Steven Davy related author profile picture

Alexander Willner related author profile picture

Alexander Willner

Fraunhofer Institute for Open Communication Systems (Fraunhofer FOKUS)

Scott  Fowler related author profile picture

Madhusanka Liyanage related author profile picture

Richard Graveman related author profile picture

Latif Ladid related author profile picture

Uploads

Papers by Vafa Izadinia

Research paper thumbnail of Uncovering identities: A study into VPN tunnel fingerprinting

Computers & Security, 2006

Operating System fingerprinting is a reconnaissance method which can be used by attackers or fore... more Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its responses to targeted probes, or by listening on a network and passively observing its network 'etiquette'. The increased deployment of encrypted tunnels and Virtual Private Networks (VPNs) calls for the formulation of new fingerprinting techniques, and poses the question:

Research paper thumbnail of Foiling an Attack - Defeating IPSec Tunnel Fingerprinting

This paper addresses some of the discriminants that make IPSec tunnel fingerprinting possible. Fi... more This paper addresses some of the discriminants that make IPSec tunnel fingerprinting possible. Fingerprinting of VPN-tunnel endpoints may be desirable for forensic purposes, but in the hands of individuals of ill-intent, it undermines an enterprise network's perimeter security. Three ways of preventing the ill-use of this type of fingerprinting are presented. The first two, apply to enterprises wishing to make their VPN tunnels immune to fingerprinting. The third delves deeper into the conceptual, and is directed at the standards definition process, as used by the Internet Engineering Task Force (IETF) and to authors of security-related RFCs in particular. It addresses aspects in the Internet Key Exchange version 1 (IKEv1) RFC that have led to misinterpretations on the part of IPSec implementers, and describes the use of a form of process algebra known as Communicating Sequential Processes (CSP) in defining security-related standards to overcome RFC-related ambiguities.

Research paper thumbnail of Uncovering identities: A study into VPN tunnel fingerprinting

Computers & Security, 2006

Operating System fingerprinting is a reconnaissance method which can be used by attackers or fore... more Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its responses to targeted probes, or by listening on a network and passively observing its network 'etiquette'. The increased deployment of encrypted tunnels and Virtual Private Networks (VPNs) calls for the formulation of new fingerprinting techniques, and poses the question:

Research paper thumbnail of Foiling an Attack - Defeating IPSec Tunnel Fingerprinting

This paper addresses some of the discriminants that make IPSec tunnel fingerprinting possible. Fi... more This paper addresses some of the discriminants that make IPSec tunnel fingerprinting possible. Fingerprinting of VPN-tunnel endpoints may be desirable for forensic purposes, but in the hands of individuals of ill-intent, it undermines an enterprise network's perimeter security. Three ways of preventing the ill-use of this type of fingerprinting are presented. The first two, apply to enterprises wishing to make their VPN tunnels immune to fingerprinting. The third delves deeper into the conceptual, and is directed at the standards definition process, as used by the Internet Engineering Task Force (IETF) and to authors of security-related RFCs in particular. It addresses aspects in the Internet Key Exchange version 1 (IKEv1) RFC that have led to misinterpretations on the part of IPSec implementers, and describes the use of a form of process algebra known as Communicating Sequential Processes (CSP) in defining security-related standards to overcome RFC-related ambiguities.

Log In