Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic
T Van Ede, R Bortolameotti, A Continella… - Network and distributed …, 2020 - par.nsf.gov
Mobile-application fingerprinting of network traffic is valuable for many security solutions as
it provides insights into the apps active on a network. Unfortunately, existing techniques …
it provides insights into the apps active on a network. Unfortunately, existing techniques …
Active learning for network traffic classification: a technical study
Network Traffic Classification (NTC) has become an important feature in various network
management operations, eg, Quality of Service (QoS) provisioning and security services …
management operations, eg, Quality of Service (QoS) provisioning and security services …
CRUSOE: A toolset for cyber situational awareness and decision support in incident handling
The growing size and complexity of today's computer network make it hard to achieve and
maintain so-called cyber situational awareness, ie, the ability to perceive and comprehend …
maintain so-called cyber situational awareness, ie, the ability to perceive and comprehend …
[HTML][HTML] Passive operating system fingerprinting revisited: Evaluation and current challenges
Fingerprinting a host's operating system is a very common yet precarious task in network,
asset, and vulnerability management. Estimating the operating system via network traffic …
asset, and vulnerability management. Estimating the operating system via network traffic …
Iot or not: Identifying iot devices in a short time scale
A Bremler-Barr, H Levy, Z Yakhini - NOMS 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
In recent years the number of IoT devices in home networks has increased dramatically.
Whenever a new device connects to the network, it must be quickly managed and secured …
Whenever a new device connects to the network, it must be quickly managed and secured …
CRUSOE: Data model for cyber situational awareness
Attaining and keeping cyber situational awareness is crucial for the proper incident
response, especially in critical infrastructures. Incident handlers need to process …
response, especially in critical infrastructures. Incident handlers need to process …
Study of methods for endpoint aware inspection in a next generation firewall
J Heino, A Hakkala, S Virtanen - Cybersecurity, 2022 - Springer
Given the global increase in remote work with the COVID-19 pandemic and
deperimeterization due to cloud deployment of next generation firewalls, the concept of a …
deperimeterization due to cloud deployment of next generation firewalls, the concept of a …
A machine-learning-based tool for passive os fingerprinting with tcp variant as a novel feature
With the emergence of Internet of Things (IoT), securing and managing large, complex
enterprise network infrastructure requires capturing and analyzing network traffic traces in …
enterprise network infrastructure requires capturing and analyzing network traffic traces in …
Using TLS fingerprints for OS identification in encrypted traffic
Asset identification plays a vital role in situational awareness building. However, the current
trends in communication encryption and the emerging new protocols turn the well-known …
trends in communication encryption and the emerging new protocols turn the well-known …
Bayesian models for node-based inference techniques
Cyber attackers often use passive reconnaissance to collect information about target
networks. This technique can be used to identify systems and plan attacks, making it an …
networks. This technique can be used to identify systems and plan attacks, making it an …