[HTML][HTML] Passive operating system fingerprinting revisited: Evaluation and current challenges
Fingerprinting a host's operating system is a very common yet precarious task in network,
asset, and vulnerability management. Estimating the operating system via network traffic …
asset, and vulnerability management. Estimating the operating system via network traffic …
Application of Tabular Transformer Architectures for Operating System Fingerprinting
Operating System (OS) fingerprinting is essential for network management and
cybersecurity, enabling accurate device identification based on network traffic analysis …
cybersecurity, enabling accurate device identification based on network traffic analysis …
Who is DNS serving for? A human-software perspective of modeling DNS services
J Qu, X Ma, W Liu - Knowledge-Based Systems, 2023 - Elsevier
Abstract The Domain Name System (DNS) is indispensable for almost all Internet services. It
has been extensively studied for applications such as anomaly detection. However, the …
has been extensively studied for applications such as anomaly detection. However, the …
A differential privacy based multi-stage network fingerprinting deception game method
Y He, C **ng, K Ding, G Zhang, L Song - Journal of Information Security and …, 2023 - Elsevier
As an active deception defense mechanism, network fingerprint obfuscation plays an
important role in deceiving the attacker's fingerprinting actions. However, the existing …
important role in deceiving the attacker's fingerprinting actions. However, the existing …
Automated Genetic Algorithms Feature Engineering for Operating System and Incident Classification in Networks
LE Valle - 2024 - search.proquest.com
Detecting and mitigating threats is paramount for maintaining the integrity of network
infrastructure. Operating System (OS) detection within local networks is a foundational …
infrastructure. Operating System (OS) detection within local networks is a foundational …
A passive OS-Fingerprinting framework using honeypot
AK Suleiman, A Kayed, RA Shamat… - … for Sustainability and …, 2022 - ieeexplore.ieee.org
Capturing and analyzing network traffic in real time is required for securing and maintaining
large, sophisticated business network infrastructure. Operating System (OS) fingerprinting …
large, sophisticated business network infrastructure. Operating System (OS) fingerprinting …
Fine-Grained Passive Operating System Identification Based on Network Traffic Sequences
Z Zhang, L Tan, D Lv - 2024 2nd International Conference on …, 2024 - ieeexplore.ieee.org
For the problem of passive operating system fingerprinting in encrypted traffic, most existing
methods identify operating systems by extracting TCP/IP protocol features and flow statistics …
methods identify operating systems by extracting TCP/IP protocol features and flow statistics …
Querent-centric Domain Name System Modeling and Its Application in Passive Software Discovery
J Qu, X Ma, W Liu - 2021 8th International Conference on …, 2021 - ieeexplore.ieee.org
Domain Name System (DNS) is indispensable to the daily operation of all Internet services,
computer programs, smartphones, etc. It has been commonly explored as a vantage point …
computer programs, smartphones, etc. It has been commonly explored as a vantage point …
A Survey on Machine Learning Based OS Fingerprinting
S Park, M An, K Yoon, HK Kim - Journal of the Korea Institute of …, 2024 - koreascience.kr
In this paper, we investigate the latest advancements in operating system (OS) identification,
with a particular emphasis on fingerprinting techniques that leverage machine learning …
with a particular emphasis on fingerprinting techniques that leverage machine learning …
Generic Encrypted Traffic Identification using Network Grammar: A Case Study in Passive OS Fingerprinting
L Rajala, K Scott - 2022 - diva-portal.org
The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of
finding and attacking vulnerable devices on government or private company networks. The …
finding and attacking vulnerable devices on government or private company networks. The …