CAO Xu, FEI Jinlong, ZHU Yuefei. Anti-fingerprinting model of operation system based on network deception[J]. Journal of Computer Applications, 2016, 36(3): 661-664.
[1] ZHOU H F, WU C M, JIANG M, et al. Evolving defense mechanism for future network security [J]. IEEE Communications Magazine, 2015, 53(4): 45-51. [2] ATIGHETCHI M, PAL P, WEBBER F, et al. Adaptive use of network-centric mechanisms in cyber defense [C]//Proceedings of the 2003 6th IEEE International Symposium on Object-oriented Real-time Distributed Computing. Washington, DC: IEEE Computer Society, 2003:183-192. [3] KIM Y-H, PARK W H. A study on cyber threat prediction based on intrusion detection event for APT attack detection [J]. Multimedia Tools and Applications, 2014, 71(2):685-698. [4] TRIFERO S, CALLAWAY D. Linux stealth patch [EB/OL]. [2013-10-29]. https://packetstormsecurity.com/files/download/29706/linux-2.2.22-stealth.diff.gz. [5] REHMET G. FreeBSD blackhole [EB/OL]. [2013-10-29]. http://www.gsp.com/cgi-bin/man.cgi?section=4&topic=blackhole. [6] HARTMEIER D. OpenBSD packet filter[EB/OL]. [2013-10-06]. http://www.openbsd.org/faq/pf/index.html. [7] ROUALLAND G, SAFFROY J M. IP personality [EB/OL]. [2013-10-06].http://ippersonality.sourceforge.net. [8] DARREN REED. Fingerprint Fucker [EB/OL].[2013-10- 06]. http://packetstormsecurity.org/UNIX/misc/bsdfpf.tar.gz. [9] CRENSHAW A. OSfuscate: change your Windows OS TCP/IP fingerprint to confuse P0f, Network Miner, Ettercap, Nmap and other OS detection tools [EB/OL].[2013-11-01]. http://www.irongeek.com/i.php?page=security/osfuscate-change-your-windows-os-tcp-ip-fingerprint-to-confuse-p0f-networkm iner-ettercap-nmap-and-other-os-detection-tools.http://www.irongeek.com/i.php?page=security/osfuscate-change-your-windows-os-tcp-ip-fingerprint-to-confuse-p0f-networkminer-ettercap-nmap-and-other-os-detection-tools [10] 马君亮,汪西莉,何聚厚,等.增强型 Anti-Xprobe2 的研究与设计[J]. 计算机工程与应用, 2012, 48(32): 1-4.(MA J L, WANG X L, HE J H, et al. Research and design of enhanced Anti-Xprobe2 [J]. Computer Engineering and Applications, 2012, 48(32): 1-4.) [11] PRIGENT G, VICHOT F, HARROUET F. IpMorph: fingerprinting spoofing unification [J]. Journal in Computer Virology, 2010, 6(4): 329-342.