Machine learning fingerprinting methods in cyber security domain: Which one to use?

M Laštovička, A Dufka… - 2018 14th International …, 2018 - ieeexplore.ieee.org
Identification of a communicating device operating system is a fundamental part of network
situational awareness. However, current networks are large and change often which implies …

Operating System Fingerprinting Using Machine Learning

A Kumar, I Soni, M Anand Kumar - Proceedings of International …, 2022 - Springer
Operating system fingerprinting is used to determine the operating system running on the
target system. Generally, while identifying an operating system, rule-based methods are …

Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms

P Yadav, A Feraudo, B Arief, SF Shahandashti… - Proceedings of the 2nd …, 2020 - dl.acm.org
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be
able to fingerprint them, for example in order to detect if there are misbehaving or even …

Passive os fingerprinting methods in the jungle of wireless networks

M Lastovicka, T Jirsik, P Celeda… - NOMS 2018-2018 …, 2018 - ieeexplore.ieee.org
Operating system fingerprinting methods are well-known in the domain of static networks
and managed environments. Yet few studies tackled this challenge in real networks, where …

[PDF][PDF] Efficient IoT Device Fingerprinting Approach using Machine Learning.

R Osei, H Louafi, M Mouhoub, Z Zhu, SDC di Vimercati… - SECRYPT, 2022 - scitepress.org
Internet of Things (IoT) usage is steadily becoming a way of life. IoT devices can be found in
smart homes, factories, farming, etc. However, skyrocketing of IoT devices comes along with …

OS fingerprinting: New techniques and a study of information gain and obfuscation

B Anderson, D McGrew - 2017 IEEE Conference on …, 2017 - ieeexplore.ieee.org
Passive operating system fingerprinting reveals valuable information to the defenders of
heterogeneous private networks; at the same time, attackers can use fingerprinting to …

Applying artificial intelligence for operating system fingerprinting

R Pérez-Jove, CR Munteanu, AP Sierra… - Engineering …, 2021 - mdpi.com
In the field of computer security, the possibility of knowing which specific version of an
operating system is running behind a machine can be useful, to assist in a penetration test …

[HTML][HTML] Passive operating system fingerprinting revisited: Evaluation and current challenges

M Laštovička, M Husák, P Velan, T Jirsík, P Čeleda - Computer Networks, 2023 - Elsevier
Fingerprinting a host's operating system is a very common yet precarious task in network,
asset, and vulnerability management. Estimating the operating system via network traffic …

Mobile App Fingerprinting through Automata Learning and Machine Learning

F Marzani, F Ghassemi… - 2023 IFIP …, 2023 - ieeexplore.ieee.org
Application fingerprinting is crucial in network management and security to provide the best
Quality of Service (QoS). To generate fingerprints for applications, we use an automata …

Machine learning methods for device identification using wireless fingerprinting

S Sobot, V Ninkovic, D Vukobratovic… - 2022 International …, 2022 - ieeexplore.ieee.org
Industrial Internet of Things (IoT) systems increasingly rely on wireless communication
standards. In a common industrial scenario, indoor wireless IoT devices communicate with …