Identification of a communicating device operating system is a fundamental part of network situational awareness. However, current networks are large and change often which implies the need for a system that will be able to continuously monitor the network and handle changes in identified operating systems. The aim of this paper is to compare machine learning methods performance for OS fingerprinting on real-world data in the terms of processing time, memory requirements, and performance measures of accuracy, precision, and recall.Identification of a communicating device operating system is a fundamental part of network situational awareness. However, current networks are large and change often which implies the need for a system that will ...
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to...
The interactions between software and hardware are increasingly important to computer system securit...
The primary objective of the proposed research is to develop a framework for smart and robust finger...
Presented at the 4th XoveTIC Conference, A Coruña, Spain, 7–8 October 2021.[Abstract] In the field o...
The Internet has become ubiquitous in our lives today. With its rapid adoption and widespread growth...
Operating system fingerprinting methods are well-known in the domain of static networks and managed ...
Operating system (OS) fingerprinting tools are essential to network security because of their rela...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
Passive fingerprinting with a Deep Learning approach. The approach is compared to three well establi...
International audienceBeing able to fingerprint devices and services, \ie remotely identify running ...
TCP/IP fingerprinting is the active or passive collection of information usually extracted from a re...
The internet has gone from being a small network of niche uses and mostly academic interest to being...
TLS fingerprinting has evolved in response to growing cybersecurity concerns. The need for a mechani...
The internet has gone from being a small network of niche uses and mostly academic interest to being...
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to...
The interactions between software and hardware are increasingly important to computer system securit...
The primary objective of the proposed research is to develop a framework for smart and robust finger...
Presented at the 4th XoveTIC Conference, A Coruña, Spain, 7–8 October 2021.[Abstract] In the field o...
The Internet has become ubiquitous in our lives today. With its rapid adoption and widespread growth...
Operating system fingerprinting methods are well-known in the domain of static networks and managed ...
Operating system (OS) fingerprinting tools are essential to network security because of their rela...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
Passive fingerprinting with a Deep Learning approach. The approach is compared to three well establi...
International audienceBeing able to fingerprint devices and services, \ie remotely identify running ...
TCP/IP fingerprinting is the active or passive collection of information usually extracted from a re...
The internet has gone from being a small network of niche uses and mostly academic interest to being...
TLS fingerprinting has evolved in response to growing cybersecurity concerns. The need for a mechani...
The internet has gone from being a small network of niche uses and mostly academic interest to being...
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to...
The interactions between software and hardware are increasingly important to computer system securit...
The primary objective of the proposed research is to develop a framework for smart and robust finger...