Passive OS Fingerprinting Methods in the Jungle of Wireless Networks

Varování

Publikace nespadá pod Fakultu sportovních studií, ale pod Ústav výpočetní techniky. Oficiální stránka publikace je na webu muni.cz.
Autoři

LAŠTOVIČKA Martin JIRSÍK Tomáš ČELEDA Pavel ŠPAČEK Stanislav FILAKOVSKÝ Daniel

Rok publikování 2018
Druh Článek ve sborníku
Konference NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium
Fakulta / Pracoviště MU

Ústav výpočetní techniky

Citace
www https://ieeexplore.ieee.org/document/8406262
Doi http://dx.doi.org/10.1109/NOMS.2018.8406262
Obor Informatika
Klíčová slova OS fingerprinting;passive monitoring;IPFIX
Přiložené soubory
Popis Operating system fingerprinting methods are well-known in the domain of static networks and managed environments. Yet few studies tackled this challenge in real networks, where users can bring and connect any device. We evaluate the performance of three OS fingerprinting methods on a large dataset collected from university wireless network. Our results show that method based on HTTP User-agents is the most accurate but can identify only low portion of the traffic. TCP/IP parameters method proved to be the opposite with high identification rate but low accuracy. We also implemented a new method based on detection of communication to OS-specific domains and its performance is comparable to the two established ones. After that, we discuss the impacts of traffic encryption and embracing new protocols such as IPv6 or HTTP/2.0 on OS fingerprinting. Our findings suggest that OS identification based on specific domain detection is viable and corresponds to the current directions of network traffic evolution, while methods based on TCP/IP parameters and User-agents will become ineffective in the future.
Související projekty:

Používáte starou verzi internetového prohlížeče. Doporučujeme aktualizovat Váš prohlížeč na nejnovější verzi.

Další info