John Heidemann

Understanding Passive and Active Service Discovery (extended)

TitleUnderstanding Passive and Active Service Discovery (extended)
Publication TypeTechnical Report
Year of Publication2007
AuthorsG. Bartlett, J. Heidemann, and C. Papadopoulos
Date Publishedmay
Institutionusc-isi
Abstract

Increasingly, network operators do not directly operate computers on their network, yet are responsible for assessing network vulnerabilities to ensure compliance with laws and policies about information disclosure, and tracking services that affect provisioning. Thus, with decentralized network management, \emphservice discovery becomes an important part of maintaining and protecting computer networks. We explore two approaches to service discovery: \emphactive probing and \emphpassive monitoring. Active probing finds all services currently on the network, except services temporarily unavailable or hidden by firewalls; however, it is often too invasive, especially if used across administrative boundaries. Passive monitoring is typically much slower and can find transient services, but misses services that are idle. We compare the accuracy of passive and active approaches to service discovery and show that they are complimentary, highlighting the need for multiple active scans coupled with long-duration passive monitoring. We find passive monitoring is well suited for quickly finding popular services, finding servers responsible for 99% of incoming connections within minutes. Active scanning is better suited to rapidly finding \emphall servers, which is important for vulnerability detection–one scan finds 98% of services in two hours, missing only a handful. External scans are an unexpected ally to passive monitoring, speeding service discovery by the equivalent of 9–15 days of additional observation. Finally, we show how the use of static or dynamic addresses changes the effectiveness of service discovery, both due to address reuse and VPN effects.

URLhttp://www.isi.edu/%7ejohnh/PAPERS/Bartlett07b.html
Groups: