NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium 2018
DOI: 10.1109/noms.2018.8406262
|View full text |Cite
|
Sign up to set email alerts
|

Passive os fingerprinting methods in the jungle of wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
39
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 30 publications
(44 citation statements)
references
References 20 publications
1
39
0
Order By: Relevance
“…Even without a priori knowledge about device types, security operators could still isolate network traffic from mobile devices based on MAC addresses and orthogonal OS fingerprinting approaches: for example, related work has shown that DHCP messages [46], TCP/IP headers [18], and OS-specific destinations [36] (e.g., update servers and mobile app markets), can be used to identify mobile devices, and even tethering.…”
Section: Threat Modelmentioning
confidence: 99%
“…Even without a priori knowledge about device types, security operators could still isolate network traffic from mobile devices based on MAC addresses and orthogonal OS fingerprinting approaches: for example, related work has shown that DHCP messages [46], TCP/IP headers [18], and OS-specific destinations [36] (e.g., update servers and mobile app markets), can be used to identify mobile devices, and even tethering.…”
Section: Threat Modelmentioning
confidence: 99%
“…Upon receiving data, an operating system is determined for every active IP address in the network according to the methods introduced in our previous paper [1]. This IP address and OS are bound and stored in the graph database after every run of the analyser.…”
Section: B Data Processingmentioning
confidence: 99%
“…In our previous work, we have shown that OS fingerprinting methods are viable in the environment of wireless networks and will outlast adaptation of new network protocols [1]. However, modern networks are constantly changing and evolving environment which poses new challenges on any OS fingerprint system.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach enables monitoring of backbone networks, but the reduced visibility may pose a challenge for established OS fingerprinting methods as the required data might be unavailable. Matousek et al [3] adapted the OS fingerprinting to the notion of network flow technology and Lastovicka et al [4] showed the flow-based fingerprinting to be usable in large dynamic networks.…”
Section: Introductionmentioning
confidence: 99%