W. Wang and T. E. Daniels, A Graph Based Approach Toward Network Forensics Analysis, ACM Transactions on Information and System Security, vol.12, issue.1, pp.1-33, 2008.
DOI : 10.1145/1410234.1410238

N. Liao, S. Tian, and T. Wang, Network forensics based on fuzzy logic and expert system, Computer Communications, vol.32, issue.17, pp.1881-1892, 2009.
DOI : 10.1016/j.comcom.2009.07.013

B. Carrier, Defining digital forensic examination and analysis tools using abstraction layers, International Journal of Digital Evidence, vol.1, 2002.

J. Mchugh, R. Mcleod, and V. Nagaonkar, Passive network forensics, ACM SIGOPS Operating Systems Review, vol.42, issue.3, pp.99-111, 2008.
DOI : 10.1145/1368506.1368520

V. Corey, C. Peterman, S. Shearin, M. S. Greenberg, and J. V. Bokkelen, Network forensics analysis, IEEE Internet Computing, vol.6, issue.6, pp.60-66, 2002.
DOI : 10.1109/MIC.2002.1067738

A. D. Keromytis, Voice over ip: Risks, threats, and vulnerabilities, International Conference on Information Systems Security (ICISS), 2009.

J. François, H. Abdelnur, R. State, and O. Festor, Advanced Fingerprinting For Inventory Management, INRIA, Research Report, 2009.

J. François, H. Abdelnur, R. State, and O. Festor, Automated Behavioral Fingerprinting, Recent Advances in Intrusion Detection, 2009.
DOI : 10.1007/978-3-642-04342-0_10

D. H. Crocker and P. Overell, RFC: Augmented BNF for Syntax Specifications: ABNF, " United States, 1997.

L. Wang, Support Vector Machines: Theory and Applications, ser. Studies in Fuzziness and Soft Computing, 2005.

A. Torsello, D. Hidovic-rowe, and M. Pelillo, Polynomial-time metrics for attributed trees, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.27, issue.7, pp.1087-1099, 2005.
DOI : 10.1109/TPAMI.2005.146

J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson et al., RFC: SIP: Session Initiation Protocol United States, 2002.

J. François, H. Abdelnur, R. State, and O. Festor, Automated Behavioral Fingerprinting, 12th International Symposium on Recent Advances in Intrusion Detection (RAID), 2009.
DOI : 10.1007/978-3-642-04342-0_10

P. Baldi, S. Brunak, Y. Chauvin, C. A. Andersen, and H. Nielsen, Assessing the accuracy of prediction algorithms for classification: an overview, Bioinformatics, vol.16, issue.5, pp.412-436, 2000.
DOI : 10.1093/bioinformatics/16.5.412

D. Comer and J. C. Lin, Probing TCP Implementations, USENIX Summer, pp.245-255, 1994.

G. F. Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. USA: Insecure, 2009.

J. Caballero, S. Venkataraman, P. Poosankam, M. G. Kang, D. Song et al., FiG: Automatic Fingerprint Generation, Distributed System Security Conference, 2007.

J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. M. Voelker, Unexpected means of protocol inference, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006.
DOI : 10.1145/1177080.1177123

H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos et al., Internet traffic classification demystified, Proceedings of the 2008 ACM CoNEXT Conference on, CONEXT '08, 2008.
DOI : 10.1145/1544012.1544023

H. Scholz, SIP Stack Fingerprinting and Stack Difference Attacks, Black Hat Briefings, 2006.

H. Yan, K. Sripanidkulchai, H. Zhang, Z. Shae, and D. Saha, Incorporating Active Fingerprinting into SPIT Prevention Systems, Annual VoIP Security Workshop, 2006.

H. Abdelnur, R. State, and O. Festor, Advanced Network Fingerprinting, Recent Advances in Intrusion Detection, 2008.
DOI : 10.1007/978-3-540-87403-4_20

URL : https://hal.archives-ouvertes.fr/inria-00326054