首页 | 本学科首页   官方微博 | 高级检索  
     

操作系统指纹特征伪装技术研究
引用本文:刘长征,王诚敏,陈莹.操作系统指纹特征伪装技术研究[J].信息网络安全,2014(5):1-4.
作者姓名:刘长征  王诚敏  陈莹
作者单位:海军工程大学科研邯,湖北武汉430033
基金项目:国家自然科学基金161202338]、湖北省自然科学基金[CDB01501]、全军军事学研究生课题[JY002-435]
摘    要:操作系统指纹特征伪装可使主机隐藏真实的操作系统信息,防止网络攻击,保证操作系统安全。目前运用于网络的各种攻击工具都是在某一特定操作系统基础上研制开发的,如果将操作系统的真实信息伪装起来就会大大减少对系统的攻击破坏程度。文章研究了操作系统指纹特征伪装方法与实现技术,并对基于互联网协议ICMP、TCP和UDP的操作系统伪装进行了测试,结果表明,该技术和方法能在一定程度上保障操作系统安全。

关 键 词:操作系统  指纹特征  伪装技术  互联网协议  安全

Research on Operating System Camouflage Technology of Fingerprint Characteristic
LIU Chang-zheng,WANG Cheng-min,CHEN Ying.Research on Operating System Camouflage Technology of Fingerprint Characteristic[J].Netinfo Security,2014(5):1-4.
Authors:LIU Chang-zheng  WANG Cheng-min  CHEN Ying
Affiliation:(Department of Research, Naval University of Engineering, Wuhan Hubei 430033, China)
Abstract:Operating system camouflage can make the host fingerprint characteristic to hide the real operating system information, prevent the network attack, and ensure the safety of the operating system. Currently used in network attack tools are developed on the basis of a particular operating system, if the operating system's real information disguised will greatly reduce the system against damage. This paper studies the operating system camouflage fingerprint characteristic method and implementation technology, and based on the operating system of the Internet protocol, ICMP, TCP and UDP camouflage was tested, the results show that the technology and method can to a certain extent to ensure the safety of the operating system.
Keywords:operating system  fingerprint characteristic  camouflage technology  the Internet Protocol  security
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号