2010
DOI: 10.1007/978-3-642-11207-2_16
|View full text |Cite
|
Sign up to set email alerts
|

An Effective TCP/IP Fingerprinting Technique Based on Strange Attractors Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 6 publications
0
15
0
Order By: Relevance
“…Over the last 20 years, these observations have led to a variety of methods [2], [3], [4], [6], [8], [16], [22], [25], [41], [42], [43], [45], [46], [50], [52], [53], [54] that perform classification using application-layer traffic, TCP/IP/UDP headers, ICMP packets, or some combination thereof. These algorithms are useful not only in network security (i.e., detection of outdated/unpatched hosts), but also market analysis [28] and Internet characterization [17], [23], [29], [31], [45].…”
Section: Introductionmentioning
confidence: 99%
“…Over the last 20 years, these observations have led to a variety of methods [2], [3], [4], [6], [8], [16], [22], [25], [41], [42], [43], [45], [46], [50], [52], [53], [54] that perform classification using application-layer traffic, TCP/IP/UDP headers, ICMP packets, or some combination thereof. These algorithms are useful not only in network security (i.e., detection of outdated/unpatched hosts), but also market analysis [28] and Internet characterization [17], [23], [29], [31], [45].…”
Section: Introductionmentioning
confidence: 99%
“…The second aspect is the amount of outbound traffic required by the classifier, which ranges from a single SYN probe [3], [50] to lengthy multi-packet exchanges [25], [29], [42], [46], [52]. Ideally, fingerprinting should be performed with no extra overhead to scan traffic, which rules out techniques [29], [52] that expect to reach the target on multiple open ports, using different protocols (e.g., ICMP, TCP, UDP), and elicit responses on closed ports.…”
Section: Methodology and Objectivesmentioning
confidence: 99%
“…Additional work includes fuzzy matching [52], automatic generation of OS features that aid fingerprinting [8], [38], application of formal testing methods to the detection problem [16], and classification using lengthy observations (up to 100K packets) of Initial Sequence Numbers (ISNs) from the TCP header [25].…”
Section: Multiple Packetsmentioning
confidence: 99%
See 1 more Smart Citation
“…2 With hundreds of transmitted probes, several protocols that must pass remote firewalls, and complaints from network administrators during fingerprinting of their networks, Nmap is not generally considered suitable for Internet-scale use. Additional classifiers in this category include p0f [34], Xprobe [33], and several others [2], [18], [28]. They have a smaller presence and significantly fewer signatures, but most of their ideas have been ported to Nmap. The second direction in Fig.…”
Section: A Remote Os Classificationmentioning
confidence: 99%