Proceedings of the 5th International Conference on Data Communication Networking 2014
DOI: 10.5220/0005099500210027
|View full text |Cite
|
Sign up to set email alerts
|

Towards Identification of Operating Systems from the Internet Traffic - IPFIX Monitoring with Fingerprinting and Clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…The use of network flow technology proved to be determining factor for many works as it enables fingerprinting in large networks. Martin Vymlátil [22] implemented the export of TCP/IP features used for OS fingerprinting into a flow exporter and continued his work with Matoušek et al [23]. They use eight TCP/IP features known from tools and previous works and show the feasibility of continuous OS fingerprinting in large networks.…”
Section: Tcp/ip Methodsmentioning
confidence: 99%
“…The use of network flow technology proved to be determining factor for many works as it enables fingerprinting in large networks. Martin Vymlátil [22] implemented the export of TCP/IP features used for OS fingerprinting into a flow exporter and continued his work with Matoušek et al [23]. They use eight TCP/IP features known from tools and previous works and show the feasibility of continuous OS fingerprinting in large networks.…”
Section: Tcp/ip Methodsmentioning
confidence: 99%
“…These tools might be misclassified as attack activities due to their probe packets; they negatively affect the network availability, they depend on a small database of IPv6 traffic, they do not support auto-detection of IPv6 mobile OS fingerprint classification and they have low accuracy (Elejla et al, 2017). And finally, they cannot determine the OS unless there is at least one open port in the host machine (Matoušek et al, 2014). Beck et al (2007) proposed a tool called osfinger6; it has built-in OS fingerprint active mechanisms for IPv6 neighbour discovery protocol (NDP) that use 156 probe packets (forged NS).…”
Section: Related Workmentioning
confidence: 99%
“…5 OS fingerprinting classifications allow the administrator to monitor and apply policies on OS types, versions and patch of the machines inside the network (Matoušek et al, 2014).…”
Section: Introductionmentioning
confidence: 99%
“…The TCP/IP and TLS methods use a Decision tree to classify the flows with labels corresponding to a specific minor version of the OS. To train the classifier, we use the methodology proposed by Husák et al [10] and further extended by Matoušek et al [21] for flow monitoring. We pair the TCP/IP parameters and User-Agents directly as they are present in the same flow.…”
Section: B Os Identificationmentioning
confidence: 99%