[go: up one dir, main page]

Ruffing et al., 2016 - Google Patents

Smartphone reconnaissance: Operating system identification

Ruffing et al., 2016

Document ID
8623626070220291313
Author
Ruffing N
Zhu Y
Libertini R
Guan Y
Bettati R
Publication year
Publication venue
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)

External Links

Snippet

Smartphone reconnaissance, the first step to launch security attacks to a target smartphone, enables an adversary to tailor attacks by exploiting known vulnerabilities of the target system. We investigate OS identification against smartphones that use encrypted traffic. A …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • H04L47/24Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
    • H04L47/2441Flow classification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/02Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
    • H04L43/026Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/06Report generation
    • H04L43/062Report generation for traffic related reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls

Similar Documents

Publication Publication Date Title
Hamza et al. Detecting volumetric attacks on lot devices via sdn-based monitoring of mud activity
Copos et al. Is anybody home? inferring activity from smart home network traffic
Agrawal et al. Low rate cloud DDoS attack defense method based on power spectral density analysis
Sforzin et al. Rpids: Raspberry pi ids—a fruitful intrusion detection system for iot
Conti et al. Can't you hear me knocking: Identification of user actions on android apps via traffic analysis
Verde et al. No NAT'd user left behind: Fingerprinting users behind NAT from NetFlow records alone
Zhang et al. Inferring users' online activities through traffic analysis
Li et al. Packet-level open-world app fingerprinting on wireless traffic
Casola et al. A security monitoring system for internet of things
Shen et al. Webpage fingerprinting using only packet length information
Sengupta et al. Exploiting diversity in android tls implementations for mobile app traffic classification
Ruffing et al. Smartphone reconnaissance: Operating system identification
Alyami et al. Wifi-based iot devices profiling attack based on eavesdropping of encrypted wifi traffic
Oh et al. AppSniffer: Towards robust mobile app fingerprinting against VPN
Papadogiannaki et al. Otter: A scalable high-resolution encrypted traffic identification engine
Catillo et al. USB-IDS-1: a public multilayer dataset of labeled network flows for IDS evaluation
Bhatt et al. HADS: Hybrid anomaly detection system for IoT environments
Patil et al. Distributed frameworks for detecting distributed denial of service attacks: a comprehensive review, challenges and future directions
Mazur et al. Multilevel modeling of distributed denial of service attacks in wireless sensor networks
Choi et al. Automated classifier generation for application-level mobile traffic identification
Deng et al. Iotspot: Identifying the iot devices using their anonymous network traffic data
Wijesinghe et al. An enhanced model for network flow based botnet detection
Petagna et al. Peel the onion: Recognition of android apps behind the tor network
He et al. AppFA: a novel approach to detect malicious android applications on the network
Agrawal et al. A survey on analyzing encrypted network traffic of mobile devices