and flexible OS fingerprinting database with minimal
intervention of a network administrator. Our first tests
show that this approach is feasible. We also imple-
mented cluster analysis using K-means algorithm in
order to show that this technique can be successfully
applied on the passive OS fingerprinting.
Our future work will focus on implementation of
different cluster analysis algorithms and their evalua-
tion on real data and comparison with existing passive
approaches. In addition, we will apply this approach
on IPv6 communication to show how to identify OSs
using the passive fingerprinting from IPv6/TCP com-
munication.
ACKNOWLEDGMENTS
Acknowledgment will be completed in the camera-
ready version of the paper due to the blind review.
Research in this paper was supported by project
”Modern Tools for Detection and Mitigation of Cy-
ber Criminality on the New Generation Internet”, no.
VG20102015022 granted by Ministry of the Interior
of the Czech Republic and project ”Research and ap-
plication of advanced methods in ICT”, no. FIT-S-14-
2299 supported by Brno University of Technology.
REFERENCES
Allen, J. M. (2007). OS and Application Fingerprinting
Techniques. Infosec reading room, SANS Institute.
Beck, F., Festor, O., and Chrisment, I. (2007). IPv6
Neighbor Discovery Protocol based OS fingerprint-
ing. Technical report, INRIA.
Caballero, J., Venkataraman, S., Poosankam, P., Kang,
M. G., Song, D., and Blum, A. (2007). FiG: Auto-
matic fingerprint generation. Department of Electrical
and Computing Engineering, page 27.
Carpenter, B. and Jiang, S. (2013). Transmission and Pro-
cessing of IPv6 Extension Headers. IETF RFC 7045.
Chapelle, O., Sch¨olkopf, B., and Zien, A., editors (2006).
Semi-Supervised Learning. MIT Press, Cambridge,
MA.
Claise, B. (2004). Cisco Systems NetFlow Services Export
Version 9. IETF RFC 3954.
Claise, B. and Trammel, B. (2013). Information Model
for IP Flow Information Export (IPFIX). IETF RFC
7012.
Claise, B., Trammel, B., and Aitken, P. (2013). Specifica-
tion of the IP Flow Information Export (IPFIX) Proto-
col for the Exchange of Flow Information. IETF RFC
7011.
Duda, R., Hart, P., and Stork, D. (2001). Pattern classi-
fication. Pattern Classification and Scene Analysis:
Pattern Classification. Wiley.
Eckstein, C. (2011). OS fingerprinting with IPv6. Infosec
reading room, SANS Institute.
Jain, A. K. (2010). Data clustering: 50 years beyond k-
means. Pattern Recognition Letters, 31(8):651–666.
Krishnan, S., Woodyatt, J., Kline, E., Hoagland, J., and
Bhatia, M. (2012). A Uniform Format for IPv6 Ex-
tension Headers. IETF RFC 6564.
Krmicek, V. (2011). Hardware-Accelerated Anomaly
Detection in High-Speed Networks. PhD. Thesis,
Masaryk University, Brno, Czech Republic.
Lippmann, R., Fried, D., Piwowarski, K., and Streilein, W.
(2013). Passive Operating System Identification from
TCP/IP Packet Headers. In Proceedings Workshop on
Data Mining for Computer Security (DMSEC).
Nerakis, E. (2006). IPv6 Host Fingerprint. Thesis, Naval
Postgraduate School, Monterey, California.
Richardson, D. W., Gribble, S. D., and Kohno, T. (2010).
The Limits of Automatic OS Fingerpritn Generation.
In Proceedings of AISec’10, Chicago, Illinois, USA.
Sanders, C. (2011). Practical Packet Analysis. No Starch
Press, 2nd edition.
Schwartzenberg, J. (2010). Using machine learning tech-
niques for advanced passive operating system finger-
printing. Msc. theses.
S.Deering and R.Hinden (1998). Internet Protocol, Version
6 (IPv6) Specification. RFC 2460.
T.Narten, E.Nordmark, W.Simpson, and H.Soliman (2007).
Neighbor Discovery for IP version 6 (IPv6). RFC
4861.
Velan, P. (2012). Processing of a Flexible Network Traffic
Flow Information. Msc. thesis, Masaryk University,
Fakulty of Informatics, Brno, Czech Republic.
Zelinka, I., Merhaut, F., and Skanderova, L. (2013). In-
vestigation on operating systems identification by
means of fractal geometry and os pseudorandom num-
ber generators. In International Joint Conference
CISIS’12-ICEUTE’12-SOCO’12 Special Sessions Ad-
vances in Intelligent Systems and Computing, volume
189, pages 151–158. Springer.
TowardsIdentificationofOperatingSystemsfromtheInternetTraffic-IPFIXMonitoringwithFingerprintingand
Clustering
27