Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic

T Van Ede, R Bortolameotti, A Continella… - Network and distributed …, 2020 - par.nsf.gov
Mobile-application fingerprinting of network traffic is valuable for many security solutions as
it provides insights into the apps active on a network. Unfortunately, existing techniques …

Active learning for network traffic classification: a technical study

A Shahraki, M Abbasi, A Taherkordi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Network Traffic Classification (NTC) has become an important feature in various network
management operations, eg, Quality of Service (QoS) provisioning and security services …

CRUSOE: A toolset for cyber situational awareness and decision support in incident handling

M Husák, L Sadlek, S Špaček, M Laštovička… - Computers & …, 2022 - Elsevier
The growing size and complexity of today's computer network make it hard to achieve and
maintain so-called cyber situational awareness, ie, the ability to perceive and comprehend …

[HTML][HTML] Passive operating system fingerprinting revisited: Evaluation and current challenges

M Laštovička, M Husák, P Velan, T Jirsík, P Čeleda - Computer Networks, 2023 - Elsevier
Fingerprinting a host's operating system is a very common yet precarious task in network,
asset, and vulnerability management. Estimating the operating system via network traffic …

Iot or not: Identifying iot devices in a short time scale

A Bremler-Barr, H Levy, Z Yakhini - NOMS 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
In recent years the number of IoT devices in home networks has increased dramatically.
Whenever a new device connects to the network, it must be quickly managed and secured …

CRUSOE: Data model for cyber situational awareness

J Komárková, M Husák, M Laštovička… - Proceedings of the 13th …, 2018 - dl.acm.org
Attaining and keeping cyber situational awareness is crucial for the proper incident
response, especially in critical infrastructures. Incident handlers need to process …

Study of methods for endpoint aware inspection in a next generation firewall

J Heino, A Hakkala, S Virtanen - Cybersecurity, 2022 - Springer
Given the global increase in remote work with the COVID-19 pandemic and
deperimeterization due to cloud deployment of next generation firewalls, the concept of a …

A machine-learning-based tool for passive os fingerprinting with tcp variant as a novel feature

DH Hagos, A Yazidi, Ø Kure… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the emergence of Internet of Things (IoT), securing and managing large, complex
enterprise network infrastructure requires capturing and analyzing network traffic traces in …

Using TLS fingerprints for OS identification in encrypted traffic

M Laštovička, S Špaček, P Velan… - NOMS 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Asset identification plays a vital role in situational awareness building. However, the current
trends in communication encryption and the emerging new protocols turn the well-known …

Bayesian models for node-based inference techniques

N Sharmin, S Roy, A Laszka, J Acosta… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
Cyber attackers often use passive reconnaissance to collect information about target
networks. This technique can be used to identify systems and plan attacks, making it an …