2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA) 2013
DOI: 10.1109/aina.2013.119
|View full text |Cite
|
Sign up to set email alerts
|

Passive OS Fingerprinting by DNS Traffic Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…Lippmann et al [8] proposed a method for operating system identification from TCP/IP packet headers and their normalization for use in different networks. these characteristics were complemented by analysis of application layer headers of DNS traffic [9] or update procedures [10] or user-agent field [11]. The following work showed that passive identification is possible even in encrypted traffic [12] and that combination or the approaches [13] can enhance the results in heterogeneous networks.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Lippmann et al [8] proposed a method for operating system identification from TCP/IP packet headers and their normalization for use in different networks. these characteristics were complemented by analysis of application layer headers of DNS traffic [9] or update procedures [10] or user-agent field [11]. The following work showed that passive identification is possible even in encrypted traffic [12] and that combination or the approaches [13] can enhance the results in heterogeneous networks.…”
Section: Background and Related Workmentioning
confidence: 99%
“…However, TCP/IP headers can also be used, e.g., for OS fingerprinting. OS can be detected using information from network flows (TTL, SYN packet size, TCP window size, User-Agent) [21], DNS traffic analysis [22], or using combination of previous and prebuilt dictionary such as in p0f tool [23]. Regarding the client identification, remote psychical client fingerprinting using clock skews was described by Kohno et al [24].…”
Section: Related Workmentioning
confidence: 99%
“…The application of this technique to the Web, in particular, has been heavily deliberated as some institutions attempt to use it to track individuals (e.g., for targeted marketing campaigns), and privacy advocates aim to the contrary and to preserve some sense of anonymity online [19]. Given its success on the Web (typically via browser fingerprinting), there have been several other areas where fingerprinting has been applied, including identifying smartphone devices [20] and operating systems (OSs) [5]. The relevance of these contributions is that they highlight the fact that through inadvertently created data, much about devices and user identities can be inferred, thereby having a direct impact on a user's privacy.…”
Section: Related Workmentioning
confidence: 99%
“…By social relationships, we refer to offline associations between individuals, and the features of those associations including strength, and any temporal and spacial constraints. This work expands on research into individual's digital footprints (e.g., [2,5,6]) to look at connections across devices and what they can reveal about social relationships. A key objective for us is to better understand the range of privacy risks accompanying the increasing use of technology.…”
Section: Introductionmentioning
confidence: 98%