2016
DOI: 10.1109/tnet.2015.2447492
|View full text |Cite
|
Sign up to set email alerts
|

Hershel: Single-Packet OS Fingerprinting

Abstract: Traditional TCP/IP fingerprinting tools (e.g., nmap) are poorly suited for Internet-wide use due to the large amount of traffic and intrusive nature of the probes. This can be overcome by approaches that rely on a single SYN packet to elicit a vector of features from the remote server; however, these methods face difficult classification problems due to the high volatility of the features and severely limited amounts of information contained therein. Since these techniques have not been studied before, we firs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
58
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 30 publications
(60 citation statements)
references
References 23 publications
(31 reference statements)
2
58
0
Order By: Relevance
“…Among Internet-wide studies, this is the largest population to be fingerprinted (i.e., 66M IPs), using the most extensive database (i.e., 420 signatures), and the first such attempt with an automatically generated D. Compared to the scan six years ago [25], we find that the number of Linux and embedded devices has almost doubled, while that of Windows has remained stable. We compare some of our results with those of Nmap and discover a major flaw in the operation of the latter that surfaces in scenarios with non-ideal network conditions (e.g., firewalls).…”
Section: A Motivation and Contributionsmentioning
confidence: 84%
See 3 more Smart Citations
“…Among Internet-wide studies, this is the largest population to be fingerprinted (i.e., 66M IPs), using the most extensive database (i.e., 420 signatures), and the first such attempt with an automatically generated D. Compared to the scan six years ago [25], we find that the number of Linux and embedded devices has almost doubled, while that of Windows has remained stable. We compare some of our results with those of Nmap and discover a major flaw in the operation of the latter that surfaces in scenarios with non-ideal network conditions (e.g., firewalls).…”
Section: A Motivation and Contributionsmentioning
confidence: 84%
“…This makes comparison between different approaches (e.g., Nmap [21], Snacktime [3], Hershel [25], p0f [34]) fairly complicated, especially if they utilize incompatible sets of features, databases, or assumptions on feature determinism. For example, consider method M 1 with n signatures and M 2 with m n. It may appear that M 1 is more powerful because its D is bigger; however, its classification accuracy may be lower due to the larger number of options to choose from and/or less reliable decision-making.…”
Section: A Motivation and Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…In a recent paper, Shamsi et al [5] proposed a single packet OS fingerprinting. As mentioned in their work, the current fingerprinting tools like NMAP are not well suited in the Internet environment due to large amount of traffic generated, and the intrusive nature of the probes.…”
Section: Network and Host Fingerprinting: An Attacker Perspectivementioning
confidence: 99%