A deception based approach for defeating OS and service fingerprinting
暂无分享,去创建一个
[1] David Lee,et al. Network Protocol System Fingerprinting - A Formal Approach , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[2] Patrice Auffret. SinFP, unification of active and passive operating system fingerprinting , 2008, Journal in Computer Virology.
[3] David Watson,et al. Protocol scrubbing: network security through transparent flow modification , 2004, IEEE/ACM Transactions on Networking.
[4] Jeannette M. Wing,et al. An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.
[5] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[6] Ieee Staff,et al. 2013 IEEE Conference on Communications and Network Security (CNS) , 2013 .
[7] Sushil Jajodia,et al. Moving Target Defense II: Application of Game Theory and Adversarial Modeling , 2012 .
[8] Gordon Fyodor Lyon,et al. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .