期刊文献+

网络设备操作系统识别技术综述

下载PDF
导出
摘要 针对网络设备操作系统识别问题,对现有识别技术进行了综述,主要讨论了基于协议栈特征的操作系统识别方法。依据是否向目标设备发送探测数据包,将识别方法分为主动探测识别方法和被动检测识别方法两大类:对于主动探测识别方法,详细讨论了基于TCP/IP响应分析的方法和基于1CMP主动探测的方法,并比较了二者的适用性;对于被动检测识别方法,深入分析了基于TCP握手的方法、基于DHCP选项的方法以及基于TCP初始序号分析的方法,并给出了其使用场景。最后,结合各种方法的特点及实际网络环境进行了总结。
作者 管涛 徐正国
出处 《电信技术研究》 2014年第6期40-48,共9页 Research on telecommunication technology
  • 相关文献

参考文献27

  • 1Veysset F, Courtay O,Heen O,et al.New tool and technique for remote operating system fingerprint- ing[J], lntranode Software Technologies,Tech.Rep, 2002:1-13.
  • 2Shu G,Lee D.Network protocol syste printing-A formal approach[C]. 25th m finger- IEEE In- ternational Conference on Computer Commu- nications. INFOCOM 2006.Barcelona, Spain:IEEE, 2006:1-12.
  • 3Medeiros J,Brito A,Pires P.A data mining based analysis of Nmap operating system fingerprint da- tabase[J].Computational Intelligence in Security for Information Systems,2009:1-8.
  • 4Medeiros J,de Medeiros Brito Jfinior A,Motta Pires P.A Qualitative survey of active TCP/IP finger- printing tools and techniques for operating systems identification[J].Computational Intelligence in Se- curity for Information Systems,2011:68-75.
  • 5Allen J M. OS and Application Fingerprinting Techniques[R].SANS Institute.2007.
  • 6郭锡泉,张会汀,方山.对操作系统指纹的研究与探讨[J].计算机系统应用,2004,13(5):22-24. 被引量:1
  • 7Taleck G. SYNSCAN:Towards complete TCP/IP fingerprinting[J].CanSecWest, Vancouver BC, Canada, 2004:1-12.
  • 8Spangler R.Analysis of remote active operating system fingerprinting tools[R].2008.
  • 9Lippmann R,Fried D,Piwowarski K,et al.Passive operating system identification from TCP/IP packet headers[C]. IEEE International Conference on Data Mining. Melbourne, Florida:IEEE, 2003:40-49.
  • 10Taleck G.Ambiguity resolution via passive os fin- gerprinting[C].6th International Symposium, RAID 2003.Pittsburgh,PA,USA:2003,2820:192-206.

二级参考文献22

  • 1王轶骏,薛质,李建华.基于TCP/IP协议栈指纹辨识的远程操作系统探测[J].计算机工程,2004,30(18):7-9. 被引量:9
  • 2[1]Beverly R.A Robust Classifier for Passive TCP/IP Fingerprinting[EB/OL].http://www.mit.edu/ ~rbeverly/papers/tcpclass-pam04-presentation.pdf,2004.
  • 3[3]Fyodor.Remote OS Detection Via TCP/IP Stack FingerPrinting[EB/OL].http://insecure.org/nmap/nmap-fingerprinting-article.txt,2002.
  • 4[4]W.Richard Stevens 著,范建华,等译.TCP/IP 详解,卷一:协议[M].北京:机械工业出版社,2000:192.
  • 5[5]insecure.org.Remote OS Detection Via TCP/IP Fingerprinting(2nd Generation)[EB/OL].http://insecure.org/nmap/osdetect/,2006.
  • 6Farrow, Rik. System Fingerprinting with Nmap[j]. Network Magazine. Nov2000, Vol. 15.
  • 7McClure, Stuart, Scambray, Joel. TCP fingerprinting solutions for Linux offer another way to gather security data[j].InfoWorld 1998,10,26,Vol.20.
  • 8方山.网络防火墙状态检测技术的研究与实现[Z].暨南大学,2003..
  • 9Fyodor.Remote OS detection via TCP/IP Stack FingerPrinting[EB/OL].http://www.insecure.org/nmap/nmap-fingerprinting-article.html.,1998-10-18.
  • 10Postel J.RFC792[S].1981.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部