{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:04Z","timestamp":1750221304650,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3133963","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"971-982","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Faulds"],"prefix":"10.1145","author":[{"given":"Zain","family":"Shamsi","sequence":"first","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Daren B.H.","family":"Cline","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Dmitri","family":"Loguinov","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1433006.1433032"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2016.036"},{"key":"e_1_3_2_2_3_1","unstructured":"Apple Support \"OS X Yosemite: Prevent others from discovering your Mac.\" [Online]. Available: https:\/\/support.apple.com\/kb\/PH18642?locale=en_US."},{"issue":"2","key":"e_1_3_2_2_4_1","first-page":"14","article-title":"A Remote Active OS Fingerprinting Tool using ICMP","volume":"27","author":"Arkin O.","year":"2002","unstructured":"O. Arkin, \"A Remote Active OS Fingerprinting Tool using ICMP,\" USENIX login, vol. 27, no. 2, pp. 14--19, Apr. 2002.","journal-title":"USENIX login"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0107-z"},{"key":"e_1_3_2_2_6_1","volume-title":"A Perl Solution for Remote OS Fingerprinting","author":"Beardsley T.","year":"2003","unstructured":"T. Beardsley, \"Snacktime: A Perl Solution for Remote OS Fingerprinting,\" Jun. 2003. [Online]. Available: http:\/\/www.packetfu.com\/wp\/snacktime.html."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24668-8_16"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_12"},{"key":"e_1_3_2_2_9_1","first-page":"27","volume-title":"NDSS","author":"Caballero J.","year":"2007","unstructured":"J. Caballero, S. Venkataraman, P. Poosankam, M. G. Kang, D. Song, and A. Blum, \"FiG: Automatic Fingerprint Generation,\" in Proc. NDSS, Feb. 2007, pp. 27--42."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663745"},{"key":"e_1_3_2_2_11_1","unstructured":"H. K. J. Chu \"Tuning TCP Parameters for the 21st Century \" Jul. 2009. [Online]. Available: http:\/\/www.ietf.org\/proceedings\/75\/slides\/tcpm-1.pdf."},{"key":"e_1_3_2_2_12_1","unstructured":"A. Crenshaw \"OSfuscate \" 2008. [Online]. Available: http:\/\/www.irongeek.com\/i.php?page=security\/code."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_2_16_1","first-page":"605","volume-title":"USENIX Security","author":"Durumeric Z.","year":"2013","unstructured":"Z. Durumeric, E. Wustrow, and J. Halderman, \"ZMap: Fast Internet-wide scanning and its Security Applications,\" in Proc. USENIX Security, Aug. 2013, pp. 605--620."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815690"},{"key":"e_1_3_2_2_18_1","first-page":"1","volume-title":"IEEE ICNP","author":"Feng X.","year":"2016","unstructured":"X. Feng, Q. Li, H. Wang, and L. Sun, \"Characterizing Industrial Control System Devices on the Internet,\" in Proc. IEEE ICNP, Nov. 2016, pp. 1--10."},{"key":"e_1_3_2_2_19_1","first-page":"1","volume-title":"IEEE INFOCOM","author":"Guoqiang S.","year":"2006","unstructured":"S. Guoqiang and D. Lee, \"Network Protocol System Fingerprinting: A Formal Approach,\" in Proc. IEEE INFOCOM, Apr. 2006, pp. 1--12."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.2307\/2527783"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452542"},{"key":"e_1_3_2_2_22_1","unstructured":"Kaspersky Labs \"Targeted Cyberattacks Logbook.\" [Online]. Available: https:\/\/apt.securelist.com."},{"key":"e_1_3_2_2_23_1","first-page":"282","volume-title":"Uncertainty in Artificial Intelligence","author":"Kearns M.","year":"1997","unstructured":"M. Kearns, Y. Mansour, and A. Ng, \"An Information-Theoretic Analysis of Hard and Soft Assignment Methods for Clustering,\" in Proc. Uncertainty in Artificial Intelligence, Aug. 1997, pp. 282--293."},{"key":"e_1_3_2_2_24_1","article-title":"Cyber-attack: Is my computer at risk?","author":"Kleinman Z.","year":"2017","unstructured":"Z. Kleinman, \"Cyber-attack: Is my computer at risk?\" BBC News, May 2017. [Online]. Available: http:\/\/www.bbc.com\/news\/technology-39896393.","journal-title":"BBC News"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_2_2_26_1","unstructured":"E. Kollmann \"Chatter on the Wire: A Look at DHCP Traffic.\" [Online]. Available: http:\/\/myweb.cableone.net\/xnih\/download\/chatter-dhcp.pdf."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879156"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533063"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815700"},{"key":"e_1_3_2_2_30_1","unstructured":"J. Matherly \"Shodan Search Engine.\" [Online]. Available: https:\/\/shodan.io."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2013.119"},{"key":"e_1_3_2_2_32_1","volume-title":"Network Security Assessment: Know Your Network. hskip 1em plus 0.5em minus 0.4emrelax O'Reilly Media","author":"McNab C.","year":"2007","unstructured":"C. McNab, Network Security Assessment: Know Your Network. hskip 1em plus 0.5em minus 0.4emrelax O'Reilly Media, Inc., 2007."},{"key":"e_1_3_2_2_33_1","first-page":"208","volume-title":"DPM\/SETOP","author":"Medeiros J.","year":"2009","unstructured":"J. Medeiros, A. Brito, and P. Pires, \"An Effective TCP\/IP Fingerprinting Technique Based on Strange Attractors Classification,\" in Proc. DPM\/SETOP, Sep. 2009, pp. 208--221."},{"key":"e_1_3_2_2_34_1","unstructured":"Microsoft Technet \"Microsoft Security Bulletin MS17-010 -- Critical.\"[Online]. Available: https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-010.aspx."},{"key":"e_1_3_2_2_35_1","unstructured":"Microsoft Technet \"Stealth Mode in Windows Firewall with Advanced Security.\" [Online]. Available: https:\/\/technet.microsoft.com\/en-us\/library\/dd448557(WS.10)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906943"},{"key":"e_1_3_2_2_37_1","unstructured":"NetApplications \"Market Share Statistics for Internet Technologies.\" [Online]. Available: http:\/\/netmarketshare.com\/."},{"key":"e_1_3_2_2_38_1","unstructured":"Netcraft Web Server Survey. [Online]. Available: http:\/\/news.netcraft.com\/."},{"key":"e_1_3_2_2_39_1","unstructured":"Nmap. [Online]. Available: http:\/\/nmap.org\/."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-009-0134-4"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078505.3078510"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866423.1866430"},{"key":"e_1_3_2_2_43_1","unstructured":"G. Roualland and J.-M. Saffroy \"IP Personality.\" [Online]. Available: http:\/\/ippersonality.sourceforge.net\/."},{"key":"e_1_3_2_2_44_1","unstructured":"S. Shah \"An Introduction to HTTP Fingerprinting \" May 2004. [Online]. Available: http:\/\/net-square.com\/httprint_paper.html."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896377.2901449"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2591972"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199327"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2002.1187081"},{"key":"e_1_3_2_2_49_1","first-page":"229","volume-title":"USENIX Security","author":"Smart M.","year":"2000","unstructured":"M. Smart, G. R. Malan, and F. Jahanian, \"Defeating TCP\/IP Stack Fingerprinting,\" in Proc. USENIX Security, Jun. 2000, pp. 229--240."},{"issue":"1","key":"e_1_3_2_2_50_1","first-page":"54","article-title":"Targeted Cyberattacks: A Superset of Advanced Persistent Threats","volume":"11","author":"Sood A. K.","year":"2013","unstructured":"A. K. Sood and R. J. Enbody, \"Targeted Cyberattacks: A Superset of Advanced Persistent Threats,\" IEEE S&P, vol. 11, no. 1, pp. 54--61, Jan. 2013.","journal-title":"IEEE S&P"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_11"},{"key":"e_1_3_2_2_52_1","volume-title":"Apr.","author":"Taleck G.","year":"2004","unstructured":"G. Taleck, \"SYNSCAN: Towards Complete TCP\/IP Fingerprinting,\" CanSecWest, Apr. 2004."},{"key":"e_1_3_2_2_53_1","volume-title":"New Tool and Technique for Remote Operating System Fingerprinting","author":"Veysset F.","year":"2002","unstructured":"F. Veysset, O. Courtay, O. Heen, and I. R. Team, \"New Tool and Technique for Remote Operating System Fingerprinting,\" Apr. 2002. [Online]. Available: http:\/\/www.ouah.org\/ring-full-paper.pdf."},{"key":"e_1_3_2_2_54_1","unstructured":"K. Wang \"Frustrating OS Fingerprinting with Morph \" 2004. [Online]. Available: http:\/\/hackerpoetry.com\/images\/defcon-12\/dc-12-presentations\/Wang\/dc-12-wang.pdf."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270338"},{"key":"e_1_3_2_2_56_1","unstructured":"M. Zalewski \"Strange Attractors and TCP\/IP Sequence Number Analysis \" Apr. 2001. [Online]. Available: http:\/\/lcamtuf.coredump.cx\/newtcp\/."},{"key":"e_1_3_2_2_57_1","volume-title":"Passive Fingerprinter","author":"Zalewski M.","year":"2012","unstructured":"M. Zalewski, \"p0f v3: Passive Fingerprinter,\" 2012. [Online]. Available: http:\/\/lcamtuf.coredump.cx\/p0f3."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133963","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133963"}},"subtitle":["A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":57,"alternative-id":["10.1145\/3133956.3133963","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3133963","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}