K-p0f: A high-throughput kernel passive OS fingerprinter

  • Jason Barnes
  • , Patrick Crowley

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Most critical security vulnerabilities depend on the OS. If a hacker finds a machine with a vulnerable OS, then he can attack the system. Network administrators can defend against OS-specific attacks if they can find vulnerable machines before hackers do, but physically checking or actively scanning a large network can take time and resources. This paper describes a modification of p0f implemented in the Linux kernel, called k-p0f, which is a tool for this problem. This paper describes the design of k-p0f and compares its performance to p0f with both laboratory-generated and real-world traffic.

Original languageEnglish
Title of host publicationANCS 2013 - Proceedings of the 9th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
PublisherIEEE Computer Society
Pages113-114
Number of pages2
ISBN (Print)9781479916405
DOIs
StatePublished - 2013
Event9th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, ANCS 2013 - San Jose, CA, United States
Duration: Oct 21 2013Oct 22 2013

Publication series

NameANCS 2013 - Proceedings of the 9th ACM/IEEE Symposium on Architectures for Networking and Communications Systems

Conference

Conference9th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, ANCS 2013
Country/TerritoryUnited States
CitySan Jose, CA
Period10/21/1310/22/13

Keywords

  • High-throughput
  • OS Fingerprinting
  • p0f
  • Passive

Fingerprint

Dive into the research topics of 'K-p0f: A high-throughput kernel passive OS fingerprinter'. Together they form a unique fingerprint.

Cite this