Operating system (OS) fingerprinting tools are essential to network security because of their relationship to vulnerability scanning and penetrating testing. Although OS identification is traditionally performed by passive or active tools, more contributions have focused on IPv4 than IPv6. This paper proposes a new methodology based on machine learning algorithms to build classification models to identify IPv6 OS fingerprinting using a newly created dataset. Unlike other proposals that mainly depend on TCP and IP generic features; this work adds other features to improve the detection accuracy. It also considers OSes installed in mobiles (Android and iOS). The experimental results have shown that the algorithms achieved high a...
9th Annual Cyber Security Summit, held June 6-8, 2017 at the Von Braun Center in Huntsville, Alabama...
Asset identification plays a vital role in situational awareness building. However, the current tren...
Asset identification plays a vital role in situational awareness building. However, the current tren...
TCP/IP fingerprinting is the active or passive collection of information usually extracted from a re...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
Identification of a communicating device operating system is a fundamental part of network situation...
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to...
Fingerprinting the Operating System (OS) running on a device based on its traffic has several applic...
Operating system fingerprinting methods are well-known in the domain of static networks and managed ...
The proliferation of Internet of Things (IoT) markets in the last decade introduces new challenges f...
The proliferation of Internet of Things (IoT) markets in the last decade introduces new challenges f...
Passive fingerprinting with a Deep Learning approach. The approach is compared to three well establi...
Presented at the 4th XoveTIC Conference, A Coruña, Spain, 7–8 October 2021.[Abstract] In the field o...
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new securi...
9th Annual Cyber Security Summit, held June 6-8, 2017 at the Von Braun Center in Huntsville, Alabama...
Asset identification plays a vital role in situational awareness building. However, the current tren...
Asset identification plays a vital role in situational awareness building. However, the current tren...
TCP/IP fingerprinting is the active or passive collection of information usually extracted from a re...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
Securing and managing large, complex enterprise network infrastructure requires capturing and analyz...
Identification of a communicating device operating system is a fundamental part of network situation...
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to...
Fingerprinting the Operating System (OS) running on a device based on its traffic has several applic...
Operating system fingerprinting methods are well-known in the domain of static networks and managed ...
The proliferation of Internet of Things (IoT) markets in the last decade introduces new challenges f...
The proliferation of Internet of Things (IoT) markets in the last decade introduces new challenges f...
Passive fingerprinting with a Deep Learning approach. The approach is compared to three well establi...
Presented at the 4th XoveTIC Conference, A Coruña, Spain, 7–8 October 2021.[Abstract] In the field o...
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new securi...
9th Annual Cyber Security Summit, held June 6-8, 2017 at the Von Braun Center in Huntsville, Alabama...
Asset identification plays a vital role in situational awareness building. However, the current tren...
Asset identification plays a vital role in situational awareness building. However, the current tren...