Identify OS from encrypted traffic with TCP/IP stack fingerprinting

Published: Oct 1, 2019
Abstract
More and more security vulnerabilities are closely related to operating system (OS) information, but how to accurately identify OS versions on a real-world dynamic network in encrypted traffic is still a challenge. In this paper, we propose a comprehensive passive OS identification method based on encrypted traffic. It takes advantage of several features in TLS headers and TCP/IP headers. Moreover, we also consider flow statistic features for...
Paper Details
Title
Identify OS from encrypted traffic with TCP/IP stack fingerprinting
Published Date
Oct 1, 2019
Citation AnalysisPro
  • Scinapse’s Top 10 Citation Journals & Affiliations graph reveals the quality and authenticity of citations received by a paper.
  • Discover whether citations have been inflated due to self-citations, or if citations include institutional bias.