
TLS 1.3
TLS 1.2
TLS 1.1
TLS 1.0
SSL
0 % 10 % 20 % 30 % 40 % 50 % 60 %
48.72 %
50.13 %
0.06 %
1.07 %
0.02 %
Fig. 5. TLS and SSL protocol versions used by clients.
VII. CONCLUSION
In this paper, we proposed a method of passive identification
of the operating system based on flow monitoring data that
leverages information from TLS handshake. To support the
idea of OS identification in encrypted traffic, we enhanced OS
identification from TCP/IP parameters by exploiting machine
learning algorithms. Finally, we repeated our experiment with
OS identification using Specific domains and HTTP User-
Agent for comparison of the new methods to established ones.
Our results prove that the OS identification from encrypted
traffic is possible, and the used methods exhibited high ac-
curacy metrics. The method based on TCP/IP parameters is
comparable to unencrypted User-Agent identification with F-
score 91.33 % (compared to 92.51 % of User-Agent method).
The method based on TLS handshake parameters performed
a bit worse with accuracy metrics around 80 %, however,
excelled in the coverage. It was able to identify more than
97 % of the devices connected to the network, which is
significantly better portion than the Specific domains or User-
Agent methods could achieve.
Concerning lessons learned from the experiments, we would
argue that methods for OS identification are mature enough
and work in dynamic networks with the majority of traffic en-
crypted. However, data acquisition is becoming more complex.
The source flow data need to be enhanced with information
from applications protocols which are continuously evolving
and changing the specifications of the data fields from previous
versions. This evolution requires the flow exported to be
continuously updated as new protocols and protocol versions
are created. Also, the correlation of data from multiple data
sources required a lot of manual work and the use of heuristics
to correctly match log records to corresponding flows. In our
future work, we plan to focus on the automation of data re-
trieval from the infrastructure elements and their normalization
for (near) real-time flow annotation. We will also keep our
close cooperation with Flowmon Networks to apply results of
this research in their monitoring solution.
ACK NOW LE DG EM EN T
This research was partly supported by the CONCORDIA
project that has received funding from the European
Union’s Horizon 2020 research and innovation programme
under grant agreement No 830927 and partly by the
ERDF project “CyberSecurity, CyberCrime and Critical
Information Infrastructures Center of Excellence” (No.
CZ.02.1.01/0.0/0.0/16 019/0000822). Martin Laˇ
stoviˇ
cka is
Brno Ph.D. Talent Scholarship Holder – Funded by the Brno
City Municipality.
REFERENCES
[1] E. Rescorla, “The Transport Layer Security (TLS) Protocol Version 1.3,”
RFC 8446.
[2] R. Hofstede, P. ˇ
Celeda, B. Trammell, I. Drago, R. Sadre, A. Sperotto,
and A. Pras, “Flow Monitoring Explained: From Packet Capture to Data
Analysis With NetFlow and IPFIX,” IEEE Communications Surveys
Tutorials, 2014.
[3] M. Lastovicka, T. Jirsik, P. Celeda, S. Spacek, and D. Filakovsky, “Pas-
sive OS Fingerprinting Methods in the Jungle of Wireless Networks,”
in NOMS 2018-2018 IEEE/IFIP Network Operations and Management
Symposium. IEEE, 2018, pp. 1–9.
[4] C. Shen, C. Liu, H. Tan, Z. Wang, D. Xu, and X. Su, “Hybrid-augmented
device fingerprinting for intrusion detection in industrial control system
networks,” IEEE Wireless Communications, vol. 25, no. 6, pp. 26–31,
2018.
[5] I. Sanchez-Rola, I. Santos, and D. Balzarotti, “Clock Around the Clock:
Time-Based Device Fingerprinting,” in Proceedings of the 2018 ACM
SIGSAC Conference on Computer and Communications Security, ser.
CCS ’18. ACM, 2018, pp. 1502–1514.
[6] P. Velan, M. ˇ
Cerm´
ak, P. ˇ
Celeda, and M. Draˇ
sar, “A Survey of Methods
for Encrypted Traffic Classification and Analysis,” Netw., vol. 25, no. 5.
[7] B. Anderson, S. Paul, and D. McGrew, “Deciphering malwares use of
TLS (without decryption),” Journal of Computer Virology and Hacking
Techniques, vol. 14, no. 3, pp. 195–211, 2018.
[8] W. M. Shbair, T. Cholez, A. Goichot, and I. Chrisment, “Efficiently
bypassing SNI-based HTTPS filtering,” in 2015 IFIP/IEEE International
Symposium on Integrated Network Management (IM). IEEE, 2015, pp.
990–995.
[9] M. Korczy´
nski and A. Duda, “Markov chain fingerprinting to classify
encrypted traffic,” in IEEE INFOCOM 2014-IEEE Conference on Com-
puter Communications. IEEE, 2014, pp. 781–789.
[10] M. Hus´
ak, M. ˇ
Cerm´
ak, T. Jirs´
ık, and P. ˇ
Celeda, “HTTPS traffic anal-
ysis and client identification using passive SSL/TLS fingerprinting,”
EURASIP Journal on Information Security, 2016.
[11] Flowmon Networks. Flowmon Probe. [Online]. Available: https:
//www.flowmon.com/en/products/flowmon/probe
[12] P. Velan and R. Krejˇ
c´
ı, “Flow Information Storage Assessment Using
IPFIXcol,” in Dependable Networks and Services, ser. Lecture Notes in
Computer Science, vol. 7279. Springer, 2012, pp. 155–158.
[13] S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, and B. Moeller,
“Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer
Security (TLS),” RFC 4492.
[14] D. K. Gillmor, “Negotiated Finite Field Diffie-Hellman Ephemeral
Parameters for Transport Layer Security (TLS),” RFC 7919.
[15] Internet Assigned Numbers Authority. Transport Layer Security (TLS)
Extensions. [Online]. Available: https://www.iana.org/assignments/
tls-extensiontype-values/tls-extensiontype-values.xhtml
[16] D. Benjamin, “Applying GREASE to TLS Extensibility,” Internet Engi-
neering Task Force, Tech. Rep., 2019.
[17] D. Eastlake, “Transport Layer Security (TLS) Extensions: Extension
Definitions,” RFC 6066.
[18] M. Laˇ
stoviˇ
cka, S. ˇ
Spaˇ
cek, P. Velan, and P. ˇ
Celeda, “Dataset Using TLS
Fingerprints for OS Identification in Encrypted Traffic,” 2019.
[19] M. Laˇ
stoviˇ
cka, A. Dufka, and J. Kom´
arkov´
a, “Machine learning fin-
gerprinting methods in cyber security domain: Which one to use?” in
2018 14th International Wireless Communications & Mobile Computing
Conference (IWCMC). IEEE, 2018, pp. 542–547.
[20] R. Lippmann, D. Fried, K. Piwowarski, and W. Streilein, “Passive op-
erating system identification from TCP/IP packet headers,” in Workshop
on Data Mining for Computer Security, 2003, p. 40.
[21] P. Matouˇ
sek, O. Ryˇ
sav´
y, M. Gr´
egr, and M. Vyml´
atil, “Towards Identifi-
cation of Operating Systems from the Internet Traffic: IPFIX Monitoring
with Fingerprinting and Clustering,” in 2014 5th International Confer-
ence on Data Communication Networking (DCNET), 2014.
[22] M. Sokolova and G. Lapalme, “A systematic analysis of performance
measures for classification tasks,” Information Processing & Manage-
ment, vol. 45, no. 4, pp. 427–437, 2009.