2008
DOI: 10.1007/978-3-540-87403-4_20
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Network Fingerprinting

Abstract: Security assessment tasks and intrusion detection systems do rely on automated fingerprinting of devices and services. Most current fingerprinting approaches use a signature matching scheme, where a set of signatures are compared with traffic issued by an unknown entity. The entity is identified by finding the closest match with the stored signatures. These fingerprinting signatures are found mostly manually, requiring a laborious activity and needing advanced domain specific expertise. In this paper we descri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 10 publications
(8 reference statements)
0
13
0
Order By: Relevance
“…Graphbased structures for client profiling were introduced by Karagiannis et al [25]. Manual labeling of fingerprints, a drawback of fingerprint-based methods, was tackled by Abdelnur et al [26]. The authors intended to solve the problem by an automation of fingerprint signature creation.…”
Section: Related Workmentioning
confidence: 99%
“…Graphbased structures for client profiling were introduced by Karagiannis et al [25]. Manual labeling of fingerprints, a drawback of fingerprint-based methods, was tackled by Abdelnur et al [26]. The authors intended to solve the problem by an automation of fingerprint signature creation.…”
Section: Related Workmentioning
confidence: 99%
“…This process can be fooled if the manufacturer string was intentionally falsified. Smarter fingerprinting schemes as described in [10] or in [11] can be supported as well. In a fingerprinting scenario, the bot is asked to fingerprint one or range of SIP extensions.…”
Section: Fingerprintingmentioning
confidence: 99%
“…Furthermore, such techniques are only able to identify devices for which signatures were manually constructed and keeping a signature database up-to-date is difficult to the huge variety and upgrade of devices. A related work is presented in [4] which needs a grid of 10 computers during several days for an equivalent dataset as the testbed dataset. We have used the constructs introduced in our previous works [10,11] and argued to use a semi supervised learning which uses a small quantity of labeled data.…”
Section: Related Workmentioning
confidence: 99%