{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:27:10Z","timestamp":1730233630371,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/icccn49398.2020.9209694","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T20:59:41Z","timestamp":1601499581000},"page":"1-11","source":"Crossref","is-referenced-by-count":2,"title":["Advanced Passive Operating System Fingerprinting Using Machine Learning and Deep Learning"],"prefix":"10.1109","author":[{"given":"Desta Haileselassie","family":"Hagos","sequence":"first","affiliation":[]},{"given":"Martin","family":"Loland","sequence":"additional","affiliation":[]},{"given":"Anis","family":"Yazidi","sequence":"additional","affiliation":[]},{"given":"Oivind","family":"Kure","sequence":"additional","affiliation":[]},{"given":"Paal E.","family":"Engelstad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505234"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298357"},{"journal-title":"Hacking Exposed","year":"2000","author":"scambray","key":"ref33"},{"key":"ref32","article-title":"The perceptron–a perciving and recognizing automation","author":"rosenbaltt","year":"1957","journal-title":"Cornell Aeronautical Laboratory Report"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0793"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0791"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.188"},{"key":"ref36","first-page":"1","author":"taleck","year":"2004","journal-title":"Synscan Towards complete tcp\/ip fingerprinting"},{"journal-title":"Analysis of Remote Active Operating System Fingerprinting Tools [Z]","year":"2003","author":"spangler","key":"ref35"},{"year":"2019","key":"ref34","article-title":"European Leadership Joint Undertaking"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2019.8935063"},{"journal-title":"Binary increase congestion control (BIC) for fast long-distance networks","year":"2004","author":"xu","key":"ref40"},{"key":"ref11","first-page":"164","author":"hagos","year":"2018","journal-title":"A machine learning approach to TCP state monitoring from passive measurements"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548064"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487396"},{"journal-title":"A Deep Learning-based Universal Tool for Operating Systems Fingerprinting from Passive Measurements","year":"2020","author":"hagos","key":"ref14"},{"key":"ref15","article-title":"The NewReno modification to TCP’s fast recovery algorithm","author":"henderson","year":"2012","journal-title":"RFC 6582"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(89)90020-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52356"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1323"},{"article-title":"Adam: A method for stochastic optimization","year":"2014","author":"kingma","key":"ref19"},{"journal-title":"Ettercap","year":"2015","author":"ornaghi","key":"ref28"},{"journal-title":"Firewalls and Internet Security Repelling the Wily Hacker","year":"2003","author":"cheswick","key":"ref4"},{"journal-title":"Network","article-title":"Netresec","year":"2007","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3012426.3022184"},{"journal-title":"Iperf3","article-title":"ESnet","year":"2017","key":"ref6"},{"key":"ref29","article-title":"Internet control message protocol","author":"postel","year":"1981","journal-title":"RFC 792"},{"article-title":"Initial TTL values","year":"2011","author":"davids","key":"ref5"},{"key":"ref8","first-page":"1","article-title":"Toward Undetected Operating System Fingerprinting","volume":"7","author":"greenwald","year":"2007","journal-title":"WOOT"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.03.033"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2017.7969609"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400105"},{"year":"2019","key":"ref1","article-title":"5G4IoT. 5G4IoT"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.18"},{"key":"ref22","article-title":"Passive os fingerprinting methods in the jungle of wireless networks","author":"lastovicka","year":"2018","journal-title":"NOMS"},{"key":"ref21","first-page":"183","author":"langley","year":"2017","journal-title":"The quic transport protocol Design and internet-scale deployment"},{"article-title":"p0f: Passive OS fingerprinting tool","year":"2017","author":"zalewski","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36084-0_17"},{"journal-title":"Xprobe2- A’Fuzzy’Approach to Remote Active Operating System Fingerprinting","year":"2002","author":"yarochkin","key":"ref41"},{"key":"ref23","article-title":"Passive operating system identification from TCP\/IP packet headers","author":"lippmann","year":"2003","journal-title":"Data Mining for Computer Security"},{"journal-title":"Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning","year":"2009","author":"lyon","key":"ref26"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/FCST.2009.21"},{"key":"ref25","article-title":"Remote OS detection via TCP\/IP stack fingerprinting","volume":"8","author":"lyon","year":"1998","journal-title":"Phrack Magazine"}],"event":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2020,8,3]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2020,8,6]]}},"container-title":["2020 29th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9205796\/9209588\/09209694.pdf?arnumber=9209694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:08:56Z","timestamp":1656374936000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9209694\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/icccn49398.2020.9209694","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}