-
1
-
-
36549062509
-
-
Sys-Security Group, July
-
O. Arkin, F. Yarochkin, and M. Kydyraliev, "The Present and Future of Xprobe2: The Next Generation of Active Operating System Fingerprinting," Sys-Security Group, July 2003, 〈http://sys-security.com/blog/published- materials/papers/〉.
-
(2003)
The Present and Future of Xprobe2: The Next Generation of Active Operating System Fingerprinting
-
-
Arkin, O.1
Yarochkin, F.2
Kydyraliev, M.3
-
2
-
-
36549087265
-
-
Jan
-
P. Auffret, "SinFP," Jan. 2007, 〈http://www.gomor.org/ sinfp/〉.
-
(2007)
SinFP
-
-
Auffret, P.1
-
7
-
-
1642317029
-
Remote OS Detection via TCP/IP Stack Fingerprinting
-
Insecure.Org, June 11
-
Fyodor, "Remote OS Detection via TCP/IP Stack Fingerprinting," Insecure.Org, June 11, 2002, 〈http://insecure.org/nmap/nmap-fingerprinting- old.html〉.
-
(2002)
-
-
Fyodor1
-
8
-
-
34548770413
-
Remote OS Detection via TCP/IP Fingerprinting (2nd Generation)
-
Insecure.Org, Jan
-
Fyodor, "Remote OS Detection via TCP/IP Fingerprinting (2nd Generation)," Insecure.Org, Jan. 2007, 〈http://insecure.org/nmap/ osdetect/〉.
-
(2007)
-
-
Fyodor1
-
9
-
-
84858468065
-
PF: The OpenBSD Packet Filter
-
Oct
-
D. Hartmeier, "PF: The OpenBSD Packet Filter," OpenBSD, Oct. 2006, 〈http://www.openbsd. org/faq/pf/〉.
-
(2006)
OpenBSD
-
-
Hartmeier, D.1
-
10
-
-
0003421246
-
-
IETF RFC 1323, May
-
V. Jacobson, R. Braden, and D. Borman, "TCP Extensions for High Performance," IETF RFC 1323, May 1992, 〈http://www.ietf.org〉.
-
(1992)
TCP Extensions for High Performance
-
-
Jacobson, V.1
Braden, R.2
Borman, D.3
-
11
-
-
36549063487
-
iplog
-
R. McCabe, "iplog," 2001, 〈http://ojnk. sourceforge.net/stuff/iplog.readme〉.
-
(2001)
-
-
McCabe, R.1
-
12
-
-
84858475910
-
Secrets of Network Cartography: A Comprehensive Guide to nmap
-
June
-
J. Messer, "Secrets of Network Cartography: A Comprehensive Guide to nmap," Network Uptime, June 2005, 〈www.networkuptime.com/nmap/index. shtml〉.
-
(2005)
Network Uptime
-
-
Messer, J.1
-
13
-
-
84858469758
-
-
Jan
-
M. Roesch, "Snort," Jan. 2007, 〈http://www.snort. org〉.
-
(2007)
Snort
-
-
Roesch, M.1
-
16
-
-
84940644968
-
-
C. E. Shannon, A Mathematical Theory of Communication, Bell Sys. Tech. J., 27:3 (1948), 379-423, 27:4 (1948), 623-656.
-
C. E. Shannon, "A Mathematical Theory of Communication," Bell Sys. Tech. J., 27:3 (1948), 379-423, 27:4 (1948), 623-656.
-
-
-
-
17
-
-
85084160906
-
Defeating TCP/IP Stack Fingerprinting
-
Denver
-
M. Smart, G. R. Malan, and F. Jahanian, "Defeating TCP/IP Stack Fingerprinting," Proc. 9th Usenix Security Symposium (USENIX '00) (Denver, 2000), pp. 229-240.
-
(2000)
Proc. 9th Usenix Security Symposium (USENIX '00)
, pp. 229-240
-
-
Smart, M.1
Malan, G.R.2
Jahanian, F.3
-
18
-
-
84858467283
-
-
Security Technologies
-
S. Trifero and D. Callaway, "Stealth," Security Technologies, 〈http://www.innu.org%7Esean/〉.
-
Stealth
-
-
Trifero, S.1
Callaway, D.2
-
19
-
-
2442501519
-
Protocol Scrubbing: Network Security Through Transparent Flow Modification
-
D. Watson, M. Smart, and G. R. Malan, "Protocol Scrubbing: Network Security Through Transparent Flow Modification," IEEE/ACM Trans. Networking, 12:2 (2004), 261-273.
-
(2004)
IEEE/ACM Trans. Networking
, vol.12
, Issue.2
, pp. 261-273
-
-
Watson, D.1
Smart, M.2
Malan, G.R.3
-
20
-
-
77955198231
-
the new pOf: 2.0.8
-
Sept. 9
-
M. Zalewski, "the new pOf: 2.0.8," Sept. 9, 2006, 〈http://lcamtuf.coredump.cx/pOf.shtml〉.
-
(2006)
-
-
Zalewski, M.1
|