Detecting Spoofed Time in NTP Traffic
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21240%2F16%3A00300037" target="_blank" >RIV/68407700:21240/16:00300037 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Detecting Spoofed Time in NTP Traffic
Original language description
Almost every device connected into a computer network uses its own system time. In order to maintain precise system time, various time synchronization protocols are used. Such protocols allow for automatic adaptation of system time to keep it precise as much as possible. This paper deals with detection of possible exploit of vulnerability of the mostly used Network Time Protocol (NTP). Using spoofed NTP messages, an attacker is able to modify the system time of victims. Bad system time might lead to crucial security threats such as usage of already-expired certificated or cache poisoning or clearing.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
JC - Computer hardware and software
OECD FORD branch
—
Result continuities
Project
—
Continuities
S - Specificky vyzkum na vysokych skolach
Others
Publication year
2016
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Proceedings of the 4th Prague Embedded Systems Workshop
ISBN
978-80-01-05984-5
ISSN
—
e-ISSN
—
Number of pages
4
Pages from-to
49-52
Publisher name
ČVUT FIT, Katedra číslicového návrhu
Place of publication
Praha
Event location
Roztoky u Prahy
Event date
Jun 30, 2016
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
—