- Title
- Remote fidelity of Container-Based Network Emulators
- Creator
- Peach, Schalk Willem
- ThesisAdvisor
- Irwin, Barry Vivian William
- Subject
- Computer networks Security measures
- Subject
- Intrusion detection systems (Computer security)
- Subject
- Computer security
- Subject
- Host-based intrusion detection systems (Computer security)
- Subject
- Emulators (Computer programs)
- Subject
- Computer network protocols
- Subject
- Container-Based Network Emulators (CBNEs)
- Subject
- Network Experimentation Platforms (NEPs)
- Date
- 2021-10-29
- Type
- Master's theses
- Type
- text
- Identifier
- http://hdl.handle.net/10962/192141
- Identifier
- vital:45199
- Description
- This thesis examines if Container-Based Network Emulators (CBNEs) are able to instantiate emulated nodes that provide sufficient realism to be used in information security experiments. The realism measure used is based on the information available from the point of view of a remote attacker. During the evaluation of a Container-Based Network Emulator (CBNE) as a platform to replicate production networks for information security experiments, it was observed that nmap fingerprinting returned Operating System (OS) family and version results inconsistent with that of the host Operating System (OS). CBNEs utilise Linux namespaces, the technology used for containerisation, to instantiate \emulated" hosts for experimental networks. Linux containers partition resources of the host OS to create lightweight virtual machines that share a single OS kernel. As all emulated hosts share the same kernel in a CBNE network, there is a reasonable expectation that the fingerprints of the host OS and emulated hosts should be the same. Based on how CBNEs instantiate emulated networks and that fingerprinting returned inconsistent results, it was hypothesised that the technologies used to construct CBNEs are capable of influencing fingerprints generated by utilities such as nmap. It was predicted that hosts emulated using different CBNEs would show deviations in remotely generated fingerprints when compared to fingerprints generated for the host OS. An experimental network consisting of two emulated hosts and a Layer 2 switch was instantiated on multiple CBNEs using the same host OS. Active and passive fingerprinting was conducted between the emulated hosts to generate fingerprints and OS family and version matches. Passive fingerprinting failed to produce OS family and version matches as the fingerprint databases for these utilities are no longer maintained. For active fingerprinting the OS family results were consistent between tested systems and the host OS, though OS version results reported was inconsistent. A comparison of the generated fingerprints revealed that for certain CBNEs fingerprint features related to network stack optimisations of the host OS deviated from other CBNEs and the host OS. The hypothesis that CBNEs can influence remotely generated fingerprints was partially confirmed. One CBNE system modified Linux kernel networking options, causing a deviation from fingerprints generated for other tested systems and the host OS. The hypothesis was also partially rejected as the technologies used by CBNEs do not influence the remote fidelity of emulated hosts.
- Description
- Thesis (MSc) -- Faculty of Science, Computer Science, 2021
- Format
- computer, online resource, application/pdf, 1 online resource (177 pages), pdf
- Publisher
- Rhodes University, Faculty of Science, Computer Science
- Language
- English
- Rights
- Peach, Schalk Willem
- Rights
- Attribution 4.0 International (CC BY 4.0)
- Rights
- Open Access
- Hits: 2534
- Visitors: 3233
- Downloads: 779
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details Download | SOURCE1 | PEACH-MSC-TR21-257.pdf | 1 MB | Adobe Acrobat PDF | View Details Download |