@inproceedings{4c36bb3b56624354b42a7e283f403c2e,
title = "K-p0f: A high-throughput kernel passive OS fingerprinter",
abstract = "Most critical security vulnerabilities depend on the OS. If a hacker finds a machine with a vulnerable OS, then he can attack the system. Network administrators can defend against OS-specific attacks if they can find vulnerable machines before hackers do, but physically checking or actively scanning a large network can take time and resources. This paper describes a modification of p0f implemented in the Linux kernel, called k-p0f, which is a tool for this problem. This paper describes the design of k-p0f and compares its performance to p0f with both laboratory-generated and real-world traffic.",
keywords = "High-throughput, OS Fingerprinting, p0f, Passive",
author = "Jason Barnes and Patrick Crowley",
year = "2013",
doi = "10.1109/ANCS.2013.6665187",
language = "English",
isbn = "9781479916405",
series = "ANCS 2013 - Proceedings of the 9th ACM/IEEE Symposium on Architectures for Networking and Communications Systems",
publisher = "IEEE Computer Society",
pages = "113--114",
booktitle = "ANCS 2013 - Proceedings of the 9th ACM/IEEE Symposium on Architectures for Networking and Communications Systems",
note = "9th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, ANCS 2013 ; Conference date: 21-10-2013 Through 22-10-2013",
}