Asset identification plays a vital role in situational awareness building. However, the current trends in communication encryption and the emerging new protocols turn the well-known methods into a decline as they lose the necessary data to work correctly. In this paper, we examine the traffic patterns of the TLS protocol and its changes introduced in version 1.3. We train a machine learning model on TLS handshake parameters to identify the operating system of the client device and compare its results to well-known identification methods. We test the proposed method in a large wireless network. Our results show that precise operating system identification can be achieved in encrypted traffic of mobile devices and notebooks connected to the w...
peer reviewedEven in the face of strong encryption, the spectacular Internet of Things (IoT...
Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration...
The proliferation of Internet of Things (IoT) markets in the last decade introduces new challenges f...
Asset identification plays a vital role in situational awareness building. However, the current tren...
The dataset consists of data from three different sources; flow records collected from the universit...
Operating system fingerprinting methods are well-known in the domain of static networks and managed ...
The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attac...
The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attac...
TLS fingerprinting has evolved in response to growing cybersecurity concerns. The need for a mechani...
Fingerprinting the Operating System (OS) running on a device based on its traffic has several applic...
We present a new method for detecting known data in certain TLS encrypted communication channels. Ou...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
The growing share of encrypted network traffic complicates network traffic analysis and network fore...
Operating system (OS) fingerprinting tools are essential to network security because of their rela...
peer reviewedEven in the face of strong encryption, the spectacular Internet of Things (IoT...
Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration...
The proliferation of Internet of Things (IoT) markets in the last decade introduces new challenges f...
Asset identification plays a vital role in situational awareness building. However, the current tren...
The dataset consists of data from three different sources; flow records collected from the universit...
Operating system fingerprinting methods are well-known in the domain of static networks and managed ...
The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attac...
The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attac...
TLS fingerprinting has evolved in response to growing cybersecurity concerns. The need for a mechani...
Fingerprinting the Operating System (OS) running on a device based on its traffic has several applic...
We present a new method for detecting known data in certain TLS encrypted communication channels. Ou...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
The growing share of encrypted network traffic complicates network traffic analysis and network fore...
Operating system (OS) fingerprinting tools are essential to network security because of their rela...
peer reviewedEven in the face of strong encryption, the spectacular Internet of Things (IoT...
Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration...
The proliferation of Internet of Things (IoT) markets in the last decade introduces new challenges f...