Improved network security and disguising TCP/IP fingerprint through dynamic stack modification
"Each computer on a network has an OS Fingerprint that can be collected through various applications. Because of the complexity of network systems, vulnerabilities and exploitations of the same to gain access to systems will always be a problem. Those wishing to attack a system can use the OS F...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Published: |
Monterey, California. Naval Postgraduate School
2012
|
Subjects: | |
Online Access: | http://hdl.handle.net/10945/1937 |