Abstract
TCP/IP fingerprinting is the process of identifying the Operating System (OS) of a remote machine through a TCP/IP based computer network. This process has applications close related to network security and both intrusion and defense procedures may use this process to achieve their objectives. There are a large set of methods that performs this process in favorable scenarios. Nowadays there are many adversities that reduce the identification performance. This work compares the characteristics of four active fingerprint tools (Nmap, Xprobe2, SinFP and Zion) and how they deal with test environments under adverse conditions. The results show that Zion outperforms the other tools for all test environments and it is suitable even for use in sensible systems. © 2011 Springer-Verlag.
Cite
CITATION STYLE
Medeiros, J. P. S., De Medeiros Brito, A., & Motta Pires, P. S. (2011). A qualitative survey of active TCP/IP fingerprinting tools and techniques for operating systems identification. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6694 LNCS, pp. 68–75). https://doi.org/10.1007/978-3-642-21323-6_9
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.