Ruffing et al., 2016 - Google Patents
Smartphone reconnaissance: Operating system identificationRuffing et al., 2016
- Document ID
- 8623626070220291313
- Author
- Ruffing N
- Zhu Y
- Libertini R
- Guan Y
- Bettati R
- Publication year
- Publication venue
- 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)
External Links
Snippet
Smartphone reconnaissance, the first step to launch security attacks to a target smartphone, enables an adversary to tailor attacks by exploiting known vulnerabilities of the target system. We investigate OS identification against smartphones that use encrypted traffic. A …
- 238000010183 spectrum analysis 0 abstract description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/24—Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
- H04L47/2441—Flow classification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
- H04L43/026—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/06—Report generation
- H04L43/062—Report generation for traffic related reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hamza et al. | Detecting volumetric attacks on lot devices via sdn-based monitoring of mud activity | |
Copos et al. | Is anybody home? inferring activity from smart home network traffic | |
Agrawal et al. | Low rate cloud DDoS attack defense method based on power spectral density analysis | |
Sforzin et al. | Rpids: Raspberry pi ids—a fruitful intrusion detection system for iot | |
Conti et al. | Can't you hear me knocking: Identification of user actions on android apps via traffic analysis | |
Verde et al. | No NAT'd user left behind: Fingerprinting users behind NAT from NetFlow records alone | |
Zhang et al. | Inferring users' online activities through traffic analysis | |
Li et al. | Packet-level open-world app fingerprinting on wireless traffic | |
Casola et al. | A security monitoring system for internet of things | |
Shen et al. | Webpage fingerprinting using only packet length information | |
Sengupta et al. | Exploiting diversity in android tls implementations for mobile app traffic classification | |
Ruffing et al. | Smartphone reconnaissance: Operating system identification | |
Alyami et al. | Wifi-based iot devices profiling attack based on eavesdropping of encrypted wifi traffic | |
Oh et al. | AppSniffer: Towards robust mobile app fingerprinting against VPN | |
Papadogiannaki et al. | Otter: A scalable high-resolution encrypted traffic identification engine | |
Catillo et al. | USB-IDS-1: a public multilayer dataset of labeled network flows for IDS evaluation | |
Bhatt et al. | HADS: Hybrid anomaly detection system for IoT environments | |
Patil et al. | Distributed frameworks for detecting distributed denial of service attacks: a comprehensive review, challenges and future directions | |
Mazur et al. | Multilevel modeling of distributed denial of service attacks in wireless sensor networks | |
Choi et al. | Automated classifier generation for application-level mobile traffic identification | |
Deng et al. | Iotspot: Identifying the iot devices using their anonymous network traffic data | |
Wijesinghe et al. | An enhanced model for network flow based botnet detection | |
Petagna et al. | Peel the onion: Recognition of android apps behind the tor network | |
He et al. | AppFA: a novel approach to detect malicious android applications on the network | |
Agrawal et al. | A survey on analyzing encrypted network traffic of mobile devices |