Having a good situational awareness is an important part of computer security. Knowing what is connected to the network, where it is located, and who is communicating can help make better and faster decisions when security incidents occur. This thesis is focusing on the profiling of network entities at the device level. More specifically, it focuses on the passive identification of operating systems. Every packet transferred in the network carries a specific information in its packet header that reflects the initial settings of a host's operating system. The set of these information is called the "fingerprint" of an operating system. In the thesis, there is described an implementation of a machine learning classifier using the decision tree...
Within modern network management system, application identifying plays an import ant role. Transport...
Automatic classification of devices in computer network can be used for detection of anomalies in a ...
Identification of a communicating device operating system is a fundamental part of network situation...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
TCP/IP fingerprinting is the active or passive collection of information usually extracted from a re...
Being able to fingerprint devices and services, i.e., remotely identify running code, is a powerful ...
Passive fingerprinting with a Deep Learning approach. The approach is compared to three well establi...
This proposal provides techniques for a system to identify network devices (e.g., classify their typ...
Part 6: Ph.D. Track: Methods for the Protection of Infrastructure and ServicesInternational audience...
This paper explores the effectiveness of three network tools for analyzing network traffic and highl...
To address the evolving strategies and techniques employed by hackers, intrusion detection systems (...
Operating system identification of communicating devices plays an important part in network protecti...
Our research involved the application of supervised learning techniques to the field of network base...
Modern computer network defense systems rely primarily on signature-based intrusion detection tools,...
Operating system (OS) fingerprinting tools are essential to network security because of their rela...
Within modern network management system, application identifying plays an import ant role. Transport...
Automatic classification of devices in computer network can be used for detection of anomalies in a ...
Identification of a communicating device operating system is a fundamental part of network situation...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
TCP/IP fingerprinting is the active or passive collection of information usually extracted from a re...
Being able to fingerprint devices and services, i.e., remotely identify running code, is a powerful ...
Passive fingerprinting with a Deep Learning approach. The approach is compared to three well establi...
This proposal provides techniques for a system to identify network devices (e.g., classify their typ...
Part 6: Ph.D. Track: Methods for the Protection of Infrastructure and ServicesInternational audience...
This paper explores the effectiveness of three network tools for analyzing network traffic and highl...
To address the evolving strategies and techniques employed by hackers, intrusion detection systems (...
Operating system identification of communicating devices plays an important part in network protecti...
Our research involved the application of supervised learning techniques to the field of network base...
Modern computer network defense systems rely primarily on signature-based intrusion detection tools,...
Operating system (OS) fingerprinting tools are essential to network security because of their rela...
Within modern network management system, application identifying plays an import ant role. Transport...
Automatic classification of devices in computer network can be used for detection of anomalies in a ...
Identification of a communicating device operating system is a fundamental part of network situation...