
9. REFERENCES
[1] MyWi. http://intelliborn.com/mywi.html.
[2] Nmap Security Scanner. http://nmap.org/.
[3] ntpd(8) - Linux man page. http://linux.die.net/man/
8/ntpd.
[4] PdaNet+. http://pdanet.co/.
[5] Snacktime: A Perl Solution for Remote OS Fingerprinting.
http://www.planb-security.net/wp/snacktime.
html.
[6] British Internet provider drops online tracking plans, 2009.
http://goo.gl/FHtct2.
[7] CRAWDAD data set umd/sigcomm2008. Downloaded from
http://crawdad.org/umd/sigcomm2008/, Mar. 2009.
[8] G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gürses,
F. Piessens, and B. Preneel. FPDetective: dusting the web for
fingerprinters. In Proc. of ACM CCS, 2013.
[9] S. M. Bellovin. A technique for counting NATted hosts. In
Proc. of ACM IMW, 2002.
[10] R. Beverly. A Robust Classifier for Passive TCP/IP
Fingerprinting. In Proc. of PAM, 2004.
[11] J. Bi and J. Wu. Application Presence Information based
Source Address Transition Detection for Edge Network
Security and Management. IJCSNS International Journal of
Computer Science and Network Security, 7(1), Jan. 2007.
[12] V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device
identification with radiometric signatures. In Proc. of ACM
MobiCom, 2008.
[13] E. Bursztein. Time has something to tell us about network
address translation. In Proc. of NordSec, 2007.
[14] R. Chandra, V. Padmanabhan, and M. Zhang. CRAWDAD
data set microsoft/osdi2006 (v. 2007-05-23). Downloaded
from http://crawdad.org/microsoft/osdi2006/,
May 2007.
[15] CRAWDAD. http://crawdad.cs.dartmouth.edu.
[16] P. Eckersley. How unique is your web browser? In Proc. of
PETS, 2010.
[17] E. Flood and J. Karlsson. Browser Fingerprinting. Master’s
thesis, University of Gothenburg, May 2012.
[18] F. Gagnon and B. Esfandiari. A Hybrid Approach to
Operating System Discovery Based on Diagnosis. Int. J.
Netw. Manag., 21(2):106–119, Mar. 2011.
[19] L. G. Greenwald and T. J. Thomas. Toward undetected
operating system fingerprinting. In Proc. of USENIX WOOT,
2007.
[20] S. Ha, I. Rhee, and L. Xu. CUBIC: A new TCP-friendly
high-speed TCP variant. ACM SIGOPS Operating Systems
Review, 42(5), July 2008.
[21] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann,
and I. H. Witten. The weka data mining software: An update.
SIGKDD Explor. Newsl., 11(1):10–18, Nov. 2009.
[22] T. Henderson, S. Floyd, A. Gurtov, and Y. Nishida. The
NewReno modification to TCP’s fast recovery algorithm,
2012. RFC 6582: http://tools.ietf.org/html/
rfc6582.
[23] Ingrid Lunden. Gartner: Device shipments break 2.4b units
in 2014, tablets to overtake PC sales in 2015. http://
goo.gl/1kUHwm.
[24] Y. Ishikawa, N. Yamai, K. Okayama, and M. Nakamura. An
Identification Method of PCs behind NAT Router with Proxy
Authentication on HTTP Communication. In Proc. of IEEE
SAINT, 2011.
[25] V. Jacobson, R. Braden, and D. Borman. TCP extensions for
high performance, 1992. RFC 1323: http://tools.ietf.
org/html/rfc1323.
[26] S. Jaiswal, G. Iannaccone, C. Diot, J. Kurose, and
D. Towsley. Inferring TCP Connection Characteristics
through Passive Measurements. In Proc. of IEEE
INFOCOM, 2004.
[27] A. Khakpour, J. Hulst, Z. Ge, A. Liu, D. Pei, and J. Wang.
Firewall Fingerprinting. In Proc. of IEEE INFOCOM, 2012.
[28] T. Kohno, A. Broido, and K. Claffy. Remote Physical Device
Fingerprinting. In IEEE Symposium on Security and Privacy,
2005.
[29] G. Maier, F. Schneider, and A. Feldmann. NAT Usage in
Residential Broadband Networks. In Proc. of PAM, 2011.
[30] J. P. S. Medeiros, A. M. Brito, and P. S. M. Pires. A new
method for recognizing operating systems of automation
devices. In Proc. of IEEE ETFA, 2009.
[31] S. B. Moon, P. Skelly, and D. Towsley. Estimation and
removal of clock skew from network delay measurements. In
Proc. of IEEE INFOCOM, 1999.
[32] NetMarketShare. Operating system market share.
http://www.netmarketshare.com/operating-system-market-
share.aspx.
[33] J. Pahdye and S. Floyd. On Inferring TCP Behavior. In Proc.
of ACM SIGCOMM, 2001.
[34] J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and
D. Wetherall. 802.11 user fingerprinting. In Proc. of ACM
MobiCom, 2007.
[35] P. Phaal. Detecting NAT devices using sflow. http://www.
sflow.org/detectNAT/.
[36] S. Schulz, A.-R. Sadeghi, M. Zhdanova, H. Mustafa, W. Xu,
and V. Varadharajan. Tetherway: a framework for tethering
camouflage. In Proc. of ACM WISEC, 2012.
[37] K. Straka and G. Manes. Passive Detection of NAT Routers
and Client Counting. Advances in Digital Forensics II,
222:239–246, 2006.
[38] K. Tan, J. Song, Q. Zhang, and M. Sridharan. A compound
TCP approach for high-speed and long distance networks. In
Proc. of IEEE INFOCOM, 2006.
[39] A. Tekeoglu, N. Altiparmak, and A. S. Tosun.
Approximating the Number of Active Nodes Behind a NAT
Device. In Proc. of IEEE ICCCN, 2011.
[40] L. Xu, K. Harfoush, and I. Rhee. Binary Increase Congestion
Control for Fast, Long Distance Networks. In Proc. of IEEE
INFOCOM, 2004.
[41] P. Yang, W. Luo, L. Xu, J. Deogun, and Y. Lu. TCP
Congestion Avoidance Algorithm Identification. In Proc. of
IEEE ICDCS, 2011.
[42] T.-F. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi. Host
fingerprinting and tracking on the web: Privacy and security
implications. In Proc. of NDSS, 2012.
[43] M. Zalewski. P0f. http://lcamtuf.coredump.cx/
p0f3/.