DocumentCode
607989
Title
Passive OS Fingerprinting by DNS Traffic Analysis
Author
Matsunaka, Takashi ; Yamada, Akimasa ; Kubota, Ayumu
Author_Institution
KDDI R&D Labs. Inc., Saitama, Japan
fYear
2013
fDate
25-28 March 2013
Firstpage
243
Lastpage
250
Abstract
In this paper, we propose a new passive OS fingerprinting method which only requires DNS traffic analysis. The method utilizes characteristics on DNS queries specific to each OS, e.g. unique domain names, query patterns, time interval etc. The method can estimate the number of devices with each OS from the number of queries by utilizing the characteristics of the time interval patterns. The method considers the likelihood of irregular events that some queries are sent at less than regular time intervals, and some other queries are sent at more than regular time intervals. We analyze DNS traffic sent by each OS and extract the characteristics for OS fingerprinting. Then, we examine our estimation method by using DNS traffic in our intra-network. According to our examination, some results of our estimation method are close to the results of DHCP fingerprinting.
Keywords
Internet; operating systems (computers); query processing; telecommunication traffic; DHCP fingerprinting; DNS queries; DNS traffic analysis; intranetwork; network traffic; operating systems; passive OS fingerprinting method; query patterns; time interval; time interval patterns; unique domain names; Androids; Estimation; Fingerprint recognition; Humanoid robots; IP networks; Monitoring; Servers; Passive OS fingerprinting: Traffic analysis;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Information Networking and Applications (AINA), 2013 IEEE 27th International Conference on
Conference_Location
Barcelona
ISSN
1550-445X
Print_ISBN
978-1-4673-5550-6
Electronic_ISBN
1550-445X
Type
conf
DOI
10.1109/AINA.2013.119
Filename
6531762
Link To Document