Architectures for Networking and Communications Systems 2013
DOI: 10.1109/ancs.2013.6665187
|View full text |Cite
|
Sign up to set email alerts
|

k-p0f: A high-throughput kernel passive OS fingerprinter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…The signature string format is designed to describe various features from multiple protocols and was later adopted by other tools. In 2013, a real-time version of p0f called k-p0f [30] was implemented in the PNA (Passive Network Appliance) kernel module to increase throughput as the k-p0f intercepts packets directly from the network stack. Even though p0f tool was popular, it required manual maintenance of the fingerprint database, and the last version of p0f v3 was released in 2012 with the last meaningful update of the database on May 21, 2014.…”
Section: Overview Of Toolsmentioning
confidence: 99%
“…The signature string format is designed to describe various features from multiple protocols and was later adopted by other tools. In 2013, a real-time version of p0f called k-p0f [30] was implemented in the PNA (Passive Network Appliance) kernel module to increase throughput as the k-p0f intercepts packets directly from the network stack. Even though p0f tool was popular, it required manual maintenance of the fingerprint database, and the last version of p0f v3 was released in 2012 with the last meaningful update of the database on May 21, 2014.…”
Section: Overview Of Toolsmentioning
confidence: 99%
“…Software-based passive fingerprinting tools cannot keep up with the high load (gigabits/s links). The literature has shown that said tools lead to 38% degradation in throughput [320]. Additionally, such tools are out-of-band, meaning that it is not possible to apply policies on traffic (e.g., after fingerprinting an OS).…”
Section: ) Comparison Between Switch-based and Server-based Access Controlmentioning
confidence: 99%
“…The categories of information the p0f recognizes are poor. In order to cope with the surge of network traffic caused by the growth of network scale, Barnes et al [23] proposed to deploy p0f in the Linux kernel space, which greatly speeds up analysis of network traffic. PRADS [21] passively listens to network traffic and gathers information on hosts and services.…”
Section: Network Asset Detectionmentioning
confidence: 99%