2015 IEEE Conference on Communications and Network Security (CNS) 2015
DOI: 10.1109/cns.2015.7346842
|View full text |Cite
|
Sign up to set email alerts
|

A deception based approach for defeating OS and service fingerprinting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
9
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
3

Relationship

1
9

Authors

Journals

citations
Cited by 28 publications
(10 citation statements)
references
References 5 publications
1
9
0
Order By: Relevance
“…Finally, the two works that are closer in spirit to the framework proposed in this paper are [45], [46]; both use a deceptive approach in order to confuse the attacker. In contrast to these, our framework aims at finding the best way to answer the attacker's scan queries.…”
Section: Defending Enterprise Networkmentioning
confidence: 99%
“…Finally, the two works that are closer in spirit to the framework proposed in this paper are [45], [46]; both use a deceptive approach in order to confuse the attacker. In contrast to these, our framework aims at finding the best way to answer the attacker's scan queries.…”
Section: Defending Enterprise Networkmentioning
confidence: 99%
“…The honeypots are often emulated, and there is a need to make them look like they run a particular OS or application. Albanese et al [14] in 2015 used six OS and application fingerprinting tools (Nmap, SinFP, XProbe, p0f, amap, and Nessus) to fingerprint a masquerading device. The authors illustrated how to deceive the fingerprinting tools with minimal overhead by modifying the fingerprinted hosts' outgoing traffic.…”
Section: Related Workmentioning
confidence: 99%
“…• Network traffic information. The work in [31] proposed an adaptive approach to deceive an attacker that actively collects traffic data in an attempt to obtain system fingerprints and to find a potential target. The proposed deceptive defense approach manipulates outgoing traffic so that it resembles traffic generated by a host with different system profiles (e.g., operating system and service).…”
Section: Topology Info Host Info Traffic Infomentioning
confidence: 99%