Desktop and mobile operating system fingerprinting based on IPv6 protocol using machine learning algorithms

被引:0
|
作者
Salah S. [1 ]
Abu Alhawa M. [1 ]
Zaghal R. [1 ]
机构
[1] Department of Computer Science, Al-Quds University, Jerusalem P.O. Box 20002, Palestine
来源
关键词
fingerprinting; IPv6; machine learning; mobile operating system; network security; operating system; performance measures;
D O I
10.1504/IJSN.2022.122543
中图分类号
学科分类号
摘要
Operating system (OS) fingerprinting tools are essential to network security because of their relationship to vulnerability scanning and penetrating testing. Although OS identification is traditionally performed by passive or active tools, more contributions have focused on IPv4 than IPv6. This paper proposes a new methodology based on machine learning algorithms to build classification models to identify IPv6 OS fingerprinting using a newly created dataset. Unlike other proposals that mainly depend on TCP and IP generic features; this work adds other features to improve the detection accuracy. It also considers OSes installed in mobiles (Android and iOS). The experimental results have shown that the algorithms achieved high and acceptable results in classifying OSes. KNN and DT achieved high accuracy of up to 99%. SVM and GNB achieved 81% and 75%, respectively. Moreover, KNN, RF and DT achieved the best recall, precision, and f-score with almost the same as the achieved accuracy. © 2022 Inderscience Enterprises Ltd.. All rights reserved.
引用
收藏
页码:1 / 12
页数:11
相关论文
共 50 条
  • [1] Operating System Fingerprinting Tool Based on Classical Machine Learning Algorithms
    Perez-Jove, Ruben
    Munteanu, Cristian R.
    Dorado, Julian
    Pazos, Alejandro
    Vazquez-Naya, Jose
    2023 JNIC CYBERSECURITY CONFERENCE, JNIC, 2023,
  • [2] Signaling load of hierarchical mobile IPv6 protocol in IPv6 networks
    Kong, KS
    Roh, SJ
    Hwang, CS
    PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2004, 3260 : 440 - 450
  • [3] An improved network layer protocol based on mobile IPv6
    Wang, JX
    Huang, GS
    Chen, SQ
    Chen, JE
    JOURNAL OF CENTRAL SOUTH UNIVERSITY OF TECHNOLOGY, 2001, 8 (04): : 263 - 267
  • [4] Research of mobile IPv6 application based on diameter protocol
    Wei, Da
    Liu, Yanheng
    Yu, Xuegang
    Li, Xiaodong
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 25 - +
  • [5] Validating the mobile IPv6 protocol using formal approach
    Noudem, FN
    Viho, C
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XI, PROCEEDINGS: CONTROL, COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 245 - 250
  • [6] An improved network layer protocol based on mobile IPv6
    Jian-xin Wang
    Guo-sheng Huang
    Song-qiao Chen
    Jian-er Chen
    Journal of Central South University of Technology, 2001, 8 : 263 - 267
  • [7] An improved network layer protocol based on mobile IPv6
    WANG Jian xin 1
    2.Department of Physics and Electronic Engineering
    Journal of Central South University of Technology(English Edition), 2001, (04) : 263 - 267
  • [8] Designing the mobile IPv6 security protocol
    Aura, T
    Roe, M
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2006, 61 (3-4): : 332 - 356
  • [9] Performance Testing of Mobile IPv6 Protocol
    Wang, Huiming
    Shi, Xingang
    Wang, Zhiliang
    Yin, Xia
    Wu, Jianping
    2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 761 - +
  • [10] Route optimization in Mobile IPv6 protocol
    Skorepa, Michal
    31ST INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING TSP 2008, 2008, : 90 - 93