[HTML][HTML] Passive operating system fingerprinting revisited: Evaluation and current challenges

M Laštovička, M Husák, P Velan, T Jirsík, P Čeleda - Computer Networks, 2023 - Elsevier
Fingerprinting a host's operating system is a very common yet precarious task in network,
asset, and vulnerability management. Estimating the operating system via network traffic …

Application of Tabular Transformer Architectures for Operating System Fingerprinting

R Pérez-Jove, CR Munteanu, A Pazos… - arxiv preprint arxiv …, 2025 - arxiv.org
Operating System (OS) fingerprinting is essential for network management and
cybersecurity, enabling accurate device identification based on network traffic analysis …

Who is DNS serving for? A human-software perspective of modeling DNS services

J Qu, X Ma, W Liu - Knowledge-Based Systems, 2023 - Elsevier
Abstract The Domain Name System (DNS) is indispensable for almost all Internet services. It
has been extensively studied for applications such as anomaly detection. However, the …

A differential privacy based multi-stage network fingerprinting deception game method

Y He, C **ng, K Ding, G Zhang, L Song - Journal of Information Security and …, 2023 - Elsevier
As an active deception defense mechanism, network fingerprint obfuscation plays an
important role in deceiving the attacker's fingerprinting actions. However, the existing …

Automated Genetic Algorithms Feature Engineering for Operating System and Incident Classification in Networks

LE Valle - 2024 - search.proquest.com
Detecting and mitigating threats is paramount for maintaining the integrity of network
infrastructure. Operating System (OS) detection within local networks is a foundational …

A passive OS-Fingerprinting framework using honeypot

AK Suleiman, A Kayed, RA Shamat… - … for Sustainability and …, 2022 - ieeexplore.ieee.org
Capturing and analyzing network traffic in real time is required for securing and maintaining
large, sophisticated business network infrastructure. Operating System (OS) fingerprinting …

Fine-Grained Passive Operating System Identification Based on Network Traffic Sequences

Z Zhang, L Tan, D Lv - 2024 2nd International Conference on …, 2024 - ieeexplore.ieee.org
For the problem of passive operating system fingerprinting in encrypted traffic, most existing
methods identify operating systems by extracting TCP/IP protocol features and flow statistics …

Querent-centric Domain Name System Modeling and Its Application in Passive Software Discovery

J Qu, X Ma, W Liu - 2021 8th International Conference on …, 2021 - ieeexplore.ieee.org
Domain Name System (DNS) is indispensable to the daily operation of all Internet services,
computer programs, smartphones, etc. It has been commonly explored as a vantage point …

A Survey on Machine Learning Based OS Fingerprinting

S Park, M An, K Yoon, HK Kim - Journal of the Korea Institute of …, 2024 - koreascience.kr
In this paper, we investigate the latest advancements in operating system (OS) identification,
with a particular emphasis on fingerprinting techniques that leverage machine learning …

Generic Encrypted Traffic Identification using Network Grammar: A Case Study in Passive OS Fingerprinting

L Rajala, K Scott - 2022 - diva-portal.org
The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of
finding and attacking vulnerable devices on government or private company networks. The …