Using TLS Fingerprints for OS Identification in Encrypted Traffic

Investor logo
Investor logo

Warning

This publication doesn't include Faculty of Sports Studies. It includes Institute of Computer Science. Official publication website can be found on muni.cz.
Authors

LAŠTOVIČKA Martin ŠPAČEK Stanislav VELAN Petr ČELEDA Pavel

Year of publication 2020
Type Article in Proceedings
Conference 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020)
MU Faculty or unit

Institute of Computer Science

Citation
Web https://ieeexplore.ieee.org/document/9110319
Doi http://dx.doi.org/10.1109/NOMS47738.2020.9110319
Keywords OS fingerprinting;passive monitoring;IPFIX;TLS
Attached files
Description Asset identification plays a vital role in situational awareness building. However, the current trends in communication encryption and the emerging new protocols turn the well-known methods into a decline as they lose the necessary data to work correctly. In this paper, we examine the traffic patterns of the TLS protocol and its changes introduced in version 1.3. We train a machine learning model on TLS handshake parameters to identify the operating system of the client device and compare its results to well-known identification methods. We test the proposed method in a large wireless network. Our results show that precise operating system identification can be achieved in encrypted traffic of mobile devices and notebooks connected to the wireless network.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.

More info