A qualitative survey of active TCP/IP fingerprinting tools and techniques for operating systems identification

  • Authors:
  • João Paulo S. Medeiros;Agostinho De Medeiros Brito Júnior;Paulo S. Motta Pires

  • Affiliations:
  • Security Information Laboratory, Elements of Information Processing Laboratory, Department of Exact and Applied Sciences, Federal University of Rio Grande do Norte, Natal, RN, Brazil;Security Information Laboratory, Elements of Information Processing Laboratory, Department of Computer Engineering and Automation, Federal University of Rio Grande do Norte, Natal, RN, Brazil;Security Information Laboratory, Elements of Information Processing Laboratory, Department of Computer Engineering and Automation, Federal University of Rio Grande do Norte, Natal, RN, Brazil

  • Venue:
  • CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

TCP/IP fingerprinting is the process of identifying the Operating System (OS) of a remote machine through a TCP/IP based computer network. This process has applications close related to network security and both intrusion and defense procedures may use this process to achieve their objectives. There are a large set of methods that performs this process in favorable scenarios. Nowadays there are many adversities that reduce the identification performance. This work compares the characteristics of four active fingerprint tools (Nmap, Xprobe2, SinFP and Zion) and how they deal with test environments under adverse conditions. The results show that Zion outperforms the other tools for all test environments and it is suitable even for use in sensible systems.