A REVIEW ON OPERATING SYSTEM CLASSIFICATION WITH MACHINE LEARNING USING TCP/IP AND TLS INFORMATION

DSpace Repository

Show simple item record

dc.contributor.author Pashollari, Kristjan
dc.date.accessioned 2025-01-24T10:32:55Z
dc.date.available 2025-01-24T10:32:55Z
dc.date.issued 2021-02-26
dc.identifier.uri http://dspace.epoka.edu.al/handle/1/2447
dc.description.abstract It is an issue of both security and management for all network administrators to determine the Operating Systems (OS) that are using their network. Identification of Operating Systems in any kind of network has been a real challenge due to the rapid changes of the encryption protocols and the quick enlargement of the data. In order to solve this problem, there are plenty active and passive fingerprinting methods than can lead to finding the real OS behind the traffic, but on top of these outdated methods, the one that has a great interest from all researchers is undoubtfully using Machine Learning (ML). The difficulties in this field starts from building the dataset, to choosing the best algorithm to find the OS from some simple features of TCP/IP packets or from TLS handshake information. In this thesis we will show how can OS fingerprinting can be achieved with machine learning and what are the tools that one may need to do this task. We will state also different methods of OS fingerprinting using network traffic. en_US
dc.language.iso en en_US
dc.subject OS fingerprinting, Operation System detection, Machine Learning, Classification, Encrypted Network Traffic en_US
dc.title A REVIEW ON OPERATING SYSTEM CLASSIFICATION WITH MACHINE LEARNING USING TCP/IP AND TLS INFORMATION en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account