Improved network security and disguising TCP/IP fingerprint through dynamic stack modification

"Each computer on a network has an OS Fingerprint that can be collected through various applications. Because of the complexity of network systems, vulnerabilities and exploitations of the same to gain access to systems will always be a problem. Those wishing to attack a system can use the OS F...

Full description

Bibliographic Details
Main Author: Judd, Aaron C.
Other Authors: Michael, James Bret
Format: Others
Published: Monterey, California. Naval Postgraduate School 2012
Subjects:
Online Access:http://hdl.handle.net/10945/1937
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-1937
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-19372017-05-24T16:07:27Z Improved network security and disguising TCP/IP fingerprint through dynamic stack modification Judd, Aaron C. Michael, James Bret Shing, Man-Tak Naval Postgraduate School (U.S.). Computer Science Fingerprints Computers Computer crimes Software engineering "Each computer on a network has an OS Fingerprint that can be collected through various applications. Because of the complexity of network systems, vulnerabilities and exploitations of the same to gain access to systems will always be a problem. Those wishing to attack a system can use the OS Fingerprint to identify the types of vulnerabilities and software exploits that will be effective against the system. This paper discusses how system vulnerabilities become exploited and used by network attackers. Because OS Fingerprints are one of many tools network attackers will use to identify and attack a system, concealing a system's OS Fingerprint becomes an important part of securing that system. To demonstrate the capability of concealing the OS Fingerprint of a system, a prototype system was developed. This prototype changed the OS Fingerprint of a Linux system so that it matched a Windows NT system. 2012-03-14T17:33:36Z 2012-03-14T17:33:36Z 2005-09 Thesis http://hdl.handle.net/10945/1937 62215248 Approved for public release, distribution unlimited xvi, 41 p. ; application/pdf Monterey, California. Naval Postgraduate School
collection NDLTD
format Others
sources NDLTD
topic Fingerprints
Computers
Computer crimes
Software engineering
spellingShingle Fingerprints
Computers
Computer crimes
Software engineering
Judd, Aaron C.
Improved network security and disguising TCP/IP fingerprint through dynamic stack modification
description "Each computer on a network has an OS Fingerprint that can be collected through various applications. Because of the complexity of network systems, vulnerabilities and exploitations of the same to gain access to systems will always be a problem. Those wishing to attack a system can use the OS Fingerprint to identify the types of vulnerabilities and software exploits that will be effective against the system. This paper discusses how system vulnerabilities become exploited and used by network attackers. Because OS Fingerprints are one of many tools network attackers will use to identify and attack a system, concealing a system's OS Fingerprint becomes an important part of securing that system. To demonstrate the capability of concealing the OS Fingerprint of a system, a prototype system was developed. This prototype changed the OS Fingerprint of a Linux system so that it matched a Windows NT system.
author2 Michael, James Bret
author_facet Michael, James Bret
Judd, Aaron C.
author Judd, Aaron C.
author_sort Judd, Aaron C.
title Improved network security and disguising TCP/IP fingerprint through dynamic stack modification
title_short Improved network security and disguising TCP/IP fingerprint through dynamic stack modification
title_full Improved network security and disguising TCP/IP fingerprint through dynamic stack modification
title_fullStr Improved network security and disguising TCP/IP fingerprint through dynamic stack modification
title_full_unstemmed Improved network security and disguising TCP/IP fingerprint through dynamic stack modification
title_sort improved network security and disguising tcp/ip fingerprint through dynamic stack modification
publisher Monterey, California. Naval Postgraduate School
publishDate 2012
url http://hdl.handle.net/10945/1937
work_keys_str_mv AT juddaaronc improvednetworksecurityanddisguisingtcpipfingerprintthroughdynamicstackmodification
_version_ 1718452818905399296