A qualitative survey of active TCP/IP fingerprinting tools and techniques for operating systems identification

6Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

TCP/IP fingerprinting is the process of identifying the Operating System (OS) of a remote machine through a TCP/IP based computer network. This process has applications close related to network security and both intrusion and defense procedures may use this process to achieve their objectives. There are a large set of methods that performs this process in favorable scenarios. Nowadays there are many adversities that reduce the identification performance. This work compares the characteristics of four active fingerprint tools (Nmap, Xprobe2, SinFP and Zion) and how they deal with test environments under adverse conditions. The results show that Zion outperforms the other tools for all test environments and it is suitable even for use in sensible systems. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Medeiros, J. P. S., De Medeiros Brito, A., & Motta Pires, P. S. (2011). A qualitative survey of active TCP/IP fingerprinting tools and techniques for operating systems identification. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6694 LNCS, pp. 68–75). https://doi.org/10.1007/978-3-642-21323-6_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free