FINDING · DETECTION

TCP-compliant packet alphabets are insufficient for modeling stateful firewall evasion. Including non-TCP-compliant traffic — specifically flipped-direction SYNs, out-of-window seq/ack numbers, and packets that form a parallel TCP connection in the reverse direction — is what unlocks discovery of deep attack paths. Prior model-inference work (Alembic) that restricted itself to compliant sequences produced models incapable of generating any of the 6,000+ attacks Pryde found.

From 2024-moon-prydePryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments · §4.1–§4.2 · 2024 · Symposium on Security \& Privacy

Implications

Tags

censors
generic
techniques
middlebox-interferencedpi

Extracted by claude-sonnet-4-6 — review before relying.