Applying Artificial Intelligence for Operating System Fingerprinting

Use este enlace para citar
http://hdl.handle.net/2183/29311Coleccións
- Investigación (FIC) [1627]
Metadatos
Mostrar o rexistro completo do ítemTítulo
Applying Artificial Intelligence for Operating System FingerprintingData
2021Cita bibliográfica
Pérez-Jove, R.; Munteanu, C.R.; Sierra, A.P.; Vázquez-Naya, J.M. Applying Artificial Intelligence for Operating System Fingerprinting. Eng. Proc. 2021, 7, 51. https://doi.org/10.3390/engproc2021007051
Resumo
[Abstract] In the field of computer security, the possibility of knowing which specific version of an operating system is running behind a machine can be useful, to assist in a penetration test or monitor the devices connected to a specific network. One of the most widespread tools that better provides this functionality is Nmap, which follows a rule-based approach for this process. In this context, applying machine learning techniques seems to be a good option for addressing this task. The present work explores the strengths of different machine learning algorithms to perform operating system fingerprinting, using for that, the Nmap reference database. Moreover, some optimizations were applied to the method which brought the best results, random forest, obtaining an accuracy higher than 96%.
Palabras chave
Operating systems
Fingerprinting
Nmap
Machine learning
Fingerprinting
Nmap
Machine learning
Descrición
Presented at the 4th XoveTIC Conference, A Coruña, Spain, 7–8 October 2021.
Versión do editor
Dereitos
Atribución 3.0 España