2009
DOI: 10.1007/978-3-642-04342-0_10
|View full text |Cite
|
Sign up to set email alerts
|

Automated Behavioral Fingerprinting

Abstract: The original publication is available at www.springerlink.comInternational audienceThis paper addresses the fingerprinting of devices that speak a common, yet unknown to the fingerprinting engine, protocol. We consider a behavioral approach, where the fingerprinting of an unknown protocol is based on detecting and exploiting differences in the observed behavior from two or more devices. Our approach assumes zero knowledge about the syntax and state machine underlying the protocol. The main contribution of this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 22 publications
0
15
0
Order By: Relevance
“…We use the same environment and one version for each application both for learning of the feature vectors and for identification. However, different versions of application, underlying environments or topologies possibly result in different flow patterns, as mentioned in device‐fingerprinting works . The impact on the profiling induced by these differences is to be evaluated.…”
Section: Discussionmentioning
confidence: 99%
“…We use the same environment and one version for each application both for learning of the feature vectors and for identification. However, different versions of application, underlying environments or topologies possibly result in different flow patterns, as mentioned in device‐fingerprinting works . The impact on the profiling induced by these differences is to be evaluated.…”
Section: Discussionmentioning
confidence: 99%
“…General device fingerprinting has been described in [6], [7], [8], which have explored several techniques ranging from packet header features to physical features such as clockskews. Wireless device finger printing techniques have been discussed in [9], [10], [11], [12], [13]. These works explored the device type identification by exploring the implementation differences of a common protocol such as SIP, across similar devices.…”
Section: State Of Current Researchmentioning
confidence: 99%
“…Thus, an attacker can inject such erroneous data, as shown in Figure 1, using multiple vehicle identities (sybil attack) using a standard computer which is be considered as the most realistic and threatening scenario [12]. Complementary approaches to automatically identify such unusual or unauthorized devices also exist (device fingerprinting) but are dependent on the specific protocol used [13], [14]. Even without a success rate of 100%, an attacker may cause unforeseen and catastrophic consequences to location based services (creating traffic congestion and so indirectly rerouting people to specific locations, indicating false collisions which may provoke unnecessary braking, etc).…”
Section: B Problem Descriptionmentioning
confidence: 99%