Improved network security and disguising TCP/IP fingerprint through dynamic stack modification

"Each computer on a network has an OS Fingerprint that can be collected through various applications. Because of the complexity of network systems, vulnerabilities and exploitations of the same to gain access to systems will always be a problem. Those wishing to attack a system can use the OS F...

Full description

Bibliographic Details
Main Author: Judd, Aaron C.
Other Authors: Michael, James Bret
Format: Others
Published: Monterey, California. Naval Postgraduate School 2012
Subjects:
Online Access:http://hdl.handle.net/10945/1937