Operating system fingerprinting methods are well-known in the domain of static networks and managed environments. Yet few studies tackled this challenge in real networks, where users can bring and connect any device. We evaluate the performance of three OS fingerprinting methods on a large dataset collected from university wireless network. Our results show that method based on HTTP User-agents is the most accurate but can identify only low portion of the traffic. TCP/IP parameters method proved to be the opposite with high identification rate but low accuracy. We also implemented a new method based on detection of communication to OS-specific domains and its performance is comparable to the two established ones. After that, we discuss the ...
AbstractEasy associations with wireless access points (APs) give users temporal and quick access to ...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
This paper explores the effectiveness of three network tools for analyzing network traffic and highl...
Operating system identification of communicating devices plays an important part in network protecti...
Asset identification plays a vital role in situational awareness building. However, the current tren...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
Identification of a communicating device operating system is a fundamental part of network situation...
Fingerprinting the Operating System (OS) running on a device based on its traffic has several applic...
Many vulnerabilities are operating system specific. Information about the OS of all hosts in a netwo...
Operating system (OS) fingerprinting tools are essential to network security because of their rela...
TCP/IP fingerprinting is the active or passive collection of information usually extracted from a re...
AbstractEasy associations with wireless access points (APs) give users temporal and quick access to ...
Abstract—802.11 device fingerprinting is the action of char-acterizing a target device through its w...
The Internet has become ubiquitous in our lives today. With its rapid adoption and widespread growth...
AbstractEasy associations with wireless access points (APs) give users temporal and quick access to ...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
This paper explores the effectiveness of three network tools for analyzing network traffic and highl...
Operating system identification of communicating devices plays an important part in network protecti...
Asset identification plays a vital role in situational awareness building. However, the current tren...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
Identification of a communicating device operating system is a fundamental part of network situation...
Fingerprinting the Operating System (OS) running on a device based on its traffic has several applic...
Many vulnerabilities are operating system specific. Information about the OS of all hosts in a netwo...
Operating system (OS) fingerprinting tools are essential to network security because of their rela...
TCP/IP fingerprinting is the active or passive collection of information usually extracted from a re...
AbstractEasy associations with wireless access points (APs) give users temporal and quick access to ...
Abstract—802.11 device fingerprinting is the action of char-acterizing a target device through its w...
The Internet has become ubiquitous in our lives today. With its rapid adoption and widespread growth...
AbstractEasy associations with wireless access points (APs) give users temporal and quick access to ...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
This paper explores the effectiveness of three network tools for analyzing network traffic and highl...