Applying Artificial Intelligence for Operating System Fingerprinting

Use este enlace para citar
http://hdl.handle.net/2183/29311Colecciones
- Investigación (FIC) [1627]
Metadatos
Mostrar el registro completo del ítemTítulo
Applying Artificial Intelligence for Operating System FingerprintingFecha
2021Cita bibliográfica
Pérez-Jove, R.; Munteanu, C.R.; Sierra, A.P.; Vázquez-Naya, J.M. Applying Artificial Intelligence for Operating System Fingerprinting. Eng. Proc. 2021, 7, 51. https://doi.org/10.3390/engproc2021007051
Resumen
[Abstract] In the field of computer security, the possibility of knowing which specific version of an operating system is running behind a machine can be useful, to assist in a penetration test or monitor the devices connected to a specific network. One of the most widespread tools that better provides this functionality is Nmap, which follows a rule-based approach for this process. In this context, applying machine learning techniques seems to be a good option for addressing this task. The present work explores the strengths of different machine learning algorithms to perform operating system fingerprinting, using for that, the Nmap reference database. Moreover, some optimizations were applied to the method which brought the best results, random forest, obtaining an accuracy higher than 96%.
Palabras clave
Operating systems
Fingerprinting
Nmap
Machine learning
Fingerprinting
Nmap
Machine learning
Descripción
Presented at the 4th XoveTIC Conference, A Coruña, Spain, 7–8 October 2021.
Versión del editor
Derechos
Atribución 3.0 España