FINDING · DETECTION

Manual analysis of 700+ unique packet groupings from possibly tampered connections yielded 19 high-confidence tampering signatures — up from 6 in prior work — covering 86.9% of all possibly tampered connections. Post-SYN signatures account for 43.2% of possibly tampered connections (99.5% matching a known signature), post-ACK for 16.1% (98.7%), and post-first-data-packet (PSH+ACK) for 5.3% (97.9%), with 19 signatures described as flag-sequence patterns of the form ⟨X→Y⟩ in Table 1.

From 2023-raman-globalGlobal, Passive Detection of Connection Tampering · §4.1, Table 1 · 2023 · SIGCOMM

Implications

Tags

techniques
rst-injectionpacket-injectiondpi

Extracted by claude-sonnet-4-6 — review before relying.