LFP is a fingerprinting technique aims to identify the vendor of routers on the Internet. For more details please refer to our paper.
We use Scamper (version 20191102) to probe targets. to test it:
-
Run
run.sh
to probe a list of targets./run.sh target-ips.txt target-ips.json
-
Use
analysis.py
to analyze the responses and generate fingerprintspython3 analysis.py target-ips.json
- output format: {IP|Possible Vendors|Signature}
The current set of unique and non-unique signatures can be found in the signatures directory. the signatures.csv
contains all signatures and used in the analysis script.
If you use LFP in your research, please reference it with the following citation:
@inproceedings{IMC2023-Fingerprinting,
title = {{Illuminating Router Vendor Diversity Within Providers and Along Network Paths}},
author = {Taha Albakour and Oliver Gasser and Robert Beverly and Georgios Smaragdakis},
month = {October},
year = {2023},
booktitle = {Proceedings of ACM Internet Measurement Conference (IMC) 2023},
address = {Montreal, QC, Canada}
}