Packet Inspection for Unauthorized OS Detection in Enterprises
暂无分享,去创建一个
B. S. Manoj | B. Thanudas | Tuhin Paul | Rohit Tyagi | B. Thanudas | Rohit Tyagi | T. Paul
[1] Akira Yamada,et al. Passive OS Fingerprinting by DNS Traffic Analysis , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[2] R. Lippmann,et al. Passive Operating System Identification From TCP / IP Packet Headers * , 2003 .
[3] Philip Almquist,et al. Type of Service in the Internet Protocol Suite , 1992, RFC.
[4] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[5] Robert T. Braden,et al. Requirements for Internet Hosts - Communication Layers , 1989, RFC.