메뉴 건너뛰기




Volumn , Issue , 2009, Pages 205-210

Xprobe2++: Low volume remote network information gathering tool

Author keywords

Network discovery; Network scanning; System fingerprinting

Indexed keywords

INTRUSION DETECTION SYSTEMS; NETWORK DISCOVERY; NETWORK HOSTS; NETWORK MAPPING; NETWORK SCANNING; NETWORK STACK; NETWORK SYSTEMS; OPERATING SYSTEM FINGERPRINTING; OPERATING SYSTEMS; REMOTE NETWORKS; SECURITY NETWORKS; SECURITY TOOLS; TARGET SYSTEMS; VULNERABILITY ANALYSIS;

EID: 70450104367     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2009.5270338     Document Type: Conference Paper
Times cited : (33)

References (12)
  • 1
    • 70449882122 scopus 로고    scopus 로고
    • O. Arkin and F. Yarochkin. A Fuzzy Approach to Remote Active Operating System Fingerprinting. available at http://www.sys-security.com/ archive/papers/Xprobe2.pdf, 2002.
    • O. Arkin and F. Yarochkin. A "Fuzzy" Approach to Remote Active Operating System Fingerprinting. available at http://www.sys-security.com/ archive/papers/Xprobe2.pdf, 2002.
  • 5
    • 70449765148 scopus 로고    scopus 로고
    • J. Jiao and W. Wu. A Method of Identify OS Based On TCP/IP Fingerptint. In UCSNS International Journal of Computer Science and Network Security, 6 No. 7B, 2006.
    • J. Jiao and W. Wu. A Method of Identify OS Based On TCP/IP Fingerptint. In UCSNS International Journal of Computer Science and Network Security, Vol.6 No. 7B, 2006.
  • 8
    • 3142632087 scopus 로고    scopus 로고
    • Techniques and tools for analyzing intrusion alerts
    • P. Ning, Y. Cui, D. S. Reeves, and D. Xu. Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur., 7(2):274-318, 2004.
    • (2004) ACM Trans. Inf. Syst. Secur , vol.7 , Issue.2 , pp. 274-318
    • Ning, P.1    Cui, Y.2    Reeves, D.S.3    Xu, D.4
  • 9
    • 33846251940 scopus 로고    scopus 로고
    • Sweetbait: Zero-hour worm detection and containment using low- and high-interaction honeypots
    • G. Portokalidis and H. Bos. Sweetbait: Zero-hour worm detection and containment using low- and high-interaction honeypots. Comput. Netw., 51(5):1256-1274, 2007.
    • (2007) Comput. Netw , vol.51 , Issue.5 , pp. 1256-1274
    • Portokalidis, G.1    Bos, H.2
  • 11
    • 70449741335 scopus 로고    scopus 로고
    • S. Shah. Ajax fingerprinting. http://www.netsecurity.org/dl/articles/Ajax fingerprinting.pdf, 2007.
    • (2007) Ajax fingerprinting
    • Shah, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.