메뉴 건너뛰기




Volumn 12, Issue 3, 2007, Pages 149-166

Understanding and preventing network device fingerprinting

Author keywords

[No Author keywords available]

Indexed keywords

FINGERPRINTING; NETWORK SCRUBBERS; OPEN SOURCE TOOLS;

EID: 36549030872     PISSN: 10897089     EISSN: 15387305     Source Type: Journal    
DOI: 10.1002/bltj.20257     Document Type: Article
Times cited : (7)

References (20)
  • 2
    • 36549087265 scopus 로고    scopus 로고
    • Jan
    • P. Auffret, "SinFP," Jan. 2007, 〈http://www.gomor.org/ sinfp/〉.
    • (2007) SinFP
    • Auffret, P.1
  • 7
    • 1642317029 scopus 로고    scopus 로고
    • Remote OS Detection via TCP/IP Stack Fingerprinting
    • Insecure.Org, June 11
    • Fyodor, "Remote OS Detection via TCP/IP Stack Fingerprinting," Insecure.Org, June 11, 2002, 〈http://insecure.org/nmap/nmap-fingerprinting- old.html〉.
    • (2002)
    • Fyodor1
  • 8
    • 34548770413 scopus 로고    scopus 로고
    • Remote OS Detection via TCP/IP Fingerprinting (2nd Generation)
    • Insecure.Org, Jan
    • Fyodor, "Remote OS Detection via TCP/IP Fingerprinting (2nd Generation)," Insecure.Org, Jan. 2007, 〈http://insecure.org/nmap/ osdetect/〉.
    • (2007)
    • Fyodor1
  • 9
    • 84858468065 scopus 로고    scopus 로고
    • PF: The OpenBSD Packet Filter
    • Oct
    • D. Hartmeier, "PF: The OpenBSD Packet Filter," OpenBSD, Oct. 2006, 〈http://www.openbsd. org/faq/pf/〉.
    • (2006) OpenBSD
    • Hartmeier, D.1
  • 11
    • 36549063487 scopus 로고    scopus 로고
    • iplog
    • R. McCabe, "iplog," 2001, 〈http://ojnk. sourceforge.net/stuff/iplog.readme〉.
    • (2001)
    • McCabe, R.1
  • 12
    • 84858475910 scopus 로고    scopus 로고
    • Secrets of Network Cartography: A Comprehensive Guide to nmap
    • June
    • J. Messer, "Secrets of Network Cartography: A Comprehensive Guide to nmap," Network Uptime, June 2005, 〈www.networkuptime.com/nmap/index. shtml〉.
    • (2005) Network Uptime
    • Messer, J.1
  • 13
    • 84858469758 scopus 로고    scopus 로고
    • Jan
    • M. Roesch, "Snort," Jan. 2007, 〈http://www.snort. org〉.
    • (2007) Snort
    • Roesch, M.1
  • 16
    • 84940644968 scopus 로고    scopus 로고
    • C. E. Shannon, A Mathematical Theory of Communication, Bell Sys. Tech. J., 27:3 (1948), 379-423, 27:4 (1948), 623-656.
    • C. E. Shannon, "A Mathematical Theory of Communication," Bell Sys. Tech. J., 27:3 (1948), 379-423, 27:4 (1948), 623-656.
  • 18
    • 84858467283 scopus 로고    scopus 로고
    • Security Technologies
    • S. Trifero and D. Callaway, "Stealth," Security Technologies, 〈http://www.innu.org%7Esean/〉.
    • Stealth
    • Trifero, S.1    Callaway, D.2
  • 19
    • 2442501519 scopus 로고    scopus 로고
    • Protocol Scrubbing: Network Security Through Transparent Flow Modification
    • D. Watson, M. Smart, and G. R. Malan, "Protocol Scrubbing: Network Security Through Transparent Flow Modification," IEEE/ACM Trans. Networking, 12:2 (2004), 261-273.
    • (2004) IEEE/ACM Trans. Networking , vol.12 , Issue.2 , pp. 261-273
    • Watson, D.1    Smart, M.2    Malan, G.R.3
  • 20
    • 77955198231 scopus 로고    scopus 로고
    • the new pOf: 2.0.8
    • Sept. 9
    • M. Zalewski, "the new pOf: 2.0.8," Sept. 9, 2006, 〈http://lcamtuf.coredump.cx/pOf.shtml〉.
    • (2006)
    • Zalewski, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.