Improved network security and disguising TCP/IP fingerprint through dynamic stack modification
"Each computer on a network has an OS Fingerprint that can be collected through various applications. Because of the complexity of network systems, vulnerabilities and exploitations of the same to gain access to systems will always be a problem. Those wishing to attack a system can use the OS F...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Published: |
Monterey, California. Naval Postgraduate School
2012
|
Subjects: | |
Online Access: | http://hdl.handle.net/10945/1937 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-1937 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-19372017-05-24T16:07:27Z Improved network security and disguising TCP/IP fingerprint through dynamic stack modification Judd, Aaron C. Michael, James Bret Shing, Man-Tak Naval Postgraduate School (U.S.). Computer Science Fingerprints Computers Computer crimes Software engineering "Each computer on a network has an OS Fingerprint that can be collected through various applications. Because of the complexity of network systems, vulnerabilities and exploitations of the same to gain access to systems will always be a problem. Those wishing to attack a system can use the OS Fingerprint to identify the types of vulnerabilities and software exploits that will be effective against the system. This paper discusses how system vulnerabilities become exploited and used by network attackers. Because OS Fingerprints are one of many tools network attackers will use to identify and attack a system, concealing a system's OS Fingerprint becomes an important part of securing that system. To demonstrate the capability of concealing the OS Fingerprint of a system, a prototype system was developed. This prototype changed the OS Fingerprint of a Linux system so that it matched a Windows NT system. 2012-03-14T17:33:36Z 2012-03-14T17:33:36Z 2005-09 Thesis http://hdl.handle.net/10945/1937 62215248 Approved for public release, distribution unlimited xvi, 41 p. ; application/pdf Monterey, California. Naval Postgraduate School |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
Fingerprints Computers Computer crimes Software engineering |
spellingShingle |
Fingerprints Computers Computer crimes Software engineering Judd, Aaron C. Improved network security and disguising TCP/IP fingerprint through dynamic stack modification |
description |
"Each computer on a network has an OS Fingerprint that can be collected through various applications. Because of the complexity of network systems, vulnerabilities and exploitations of the same to gain access to systems will always be a problem. Those wishing to attack a system can use the OS Fingerprint to identify the types of vulnerabilities and software exploits that will be effective against the system. This paper discusses how system vulnerabilities become exploited and used by network attackers. Because OS Fingerprints are one of many tools network attackers will use to identify and attack a system, concealing a system's OS Fingerprint becomes an important part of securing that system. To demonstrate the capability of concealing the OS Fingerprint of a system, a prototype system was developed. This prototype changed the OS Fingerprint of a Linux system so that it matched a Windows NT system. |
author2 |
Michael, James Bret |
author_facet |
Michael, James Bret Judd, Aaron C. |
author |
Judd, Aaron C. |
author_sort |
Judd, Aaron C. |
title |
Improved network security and disguising TCP/IP fingerprint through dynamic stack modification |
title_short |
Improved network security and disguising TCP/IP fingerprint through dynamic stack modification |
title_full |
Improved network security and disguising TCP/IP fingerprint through dynamic stack modification |
title_fullStr |
Improved network security and disguising TCP/IP fingerprint through dynamic stack modification |
title_full_unstemmed |
Improved network security and disguising TCP/IP fingerprint through dynamic stack modification |
title_sort |
improved network security and disguising tcp/ip fingerprint through dynamic stack modification |
publisher |
Monterey, California. Naval Postgraduate School |
publishDate |
2012 |
url |
http://hdl.handle.net/10945/1937 |
work_keys_str_mv |
AT juddaaronc improvednetworksecurityanddisguisingtcpipfingerprintthroughdynamicstackmodification |
_version_ |
1718452818905399296 |