Operating system fingerprinting via automated network traffic analysis.
Ahmet AksoySushil J. LouisMehmet Hadi GunesPublished in: CEC (2017)
Keyphrases
- traffic analysis
- operating system
- network security
- network traffic
- computer systems
- internet traffic
- microsoft windows
- traffic data
- virtual machine
- distributed systems
- application level
- address space
- memory management
- information systems
- ip addresses
- computer networks
- virtual memory
- multi tasking
- machine learning
- red hat
- peer to peer
- database systems
- social networks