메뉴 건너뛰기




Volumn , Issue , 2013, Pages 73-81

A game-theoretic approach for deceiving remote operating system fingerprinting

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 84893599604     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CNS.2013.6682694     Document Type: Conference Paper
Times cited : (31)

References (19)
  • 1
    • 77955172671 scopus 로고    scopus 로고
    • Sinfp, unification of active and passive operating system fingerprinting
    • Patrice Auffret. Sinfp, unification of active and passive operating system fingerprinting. In Journal in Computer Virology, volume 6, 2010.
    • (2010) Journal in Computer Virology , vol.6
    • Auffret, P.1
  • 7
    • 84893532641 scopus 로고    scopus 로고
    • Available in
    • Roualland and Jean-Marc Saffroy. Ip personality. 2001. Available in http://ippersonality.sourceforge.net.
    • (2001)
    • Roualland1    Saffroy, J.-M.2
  • 9
    • 84893539768 scopus 로고    scopus 로고
    • Available in
    • Adrian. Osfuscate 0.3. 2008. Available in http://www.irongeek.com.
    • (2008) Osfuscate 0.3
    • Adrian1
  • 10
    • 0004158523 scopus 로고    scopus 로고
    • Simulation studies of increased initial tcp window size
    • K. Poduri and K. Nichols. Simulation studies of increased initial tcp window size. In Internet Draft by IETF, 1998.
    • (1998) Internet Draft by IETF
    • Poduri, K.1    Nichols, K.2
  • 11
    • 84893519773 scopus 로고    scopus 로고
    • Tcp optimizer, Available in
    • Tcp optimizer, speed guide. 2011. Available in http://www.speedguide.net/ tcpoptimizer.php.
    • (2011)
  • 13
    • 32144437123 scopus 로고    scopus 로고
    • Network security mechanisms utilizing network address translation
    • J. Michalski. Network security mechanisms utilizing network address translation. In Journal of Critical Infrastructures, volume 2, 2006.
    • (2006) Journal of Critical Infrastructures , vol.2
    • Michalski, J.1
  • 14
    • 84893535649 scopus 로고    scopus 로고
    • Random host mutation for moving target defense
    • E. Al-Shaer, Q. Duan, and J. H. Jafarian. Random host mutation for moving target defense. In SECURECOMM, 2012.
    • (2012) SECURECOMM
    • Al-Shaer, E.1    Duan, Q.2    Jafarian, J.H.3
  • 15
    • 84893542862 scopus 로고    scopus 로고
    • Evaluating tests used in operating system fingerprinting
    • L. Greenwald and T. Thomas. Evaluating tests used in operating system fingerprinting. In LGS Bell Labs Innovations, 2007.
    • (2007) LGS Bell Labs Innovations
    • Greenwald, L.1    Thomas, T.2
  • 17
    • 1542313508 scopus 로고    scopus 로고
    • Available in
    • The internet traffic archive. 2008. Available in http://ita.ee.lbl.gov/ html/traces.html.
    • (2008) The Internet Traffic Archive


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.