Abstract

Nowadays, computer networks have become as popular as telephone networks fifteen years ago and by the year they are playing ever more important functions in human life. Not only they have created huge opportunities in many areas of life, facilitating communications or obtaining information, but also have provided online entertainment as well. The invention, originally developed for military purposes in one of the darkest periods of human civilization, has become the greatest discovery of the twentieth century, connecting millions of people around the world into one big community. Whatever the differences in size or devices used, a computer network can be defined as a combination of terminal devices, transmission medium, intermediate communication devices and network software (network area). Currently, anyone can build their own network or join the largest of them - the Internet - via a local Internet provider. Unfortunately, the Internet is not only a virtually unlimited source of information, entertainment, communication, and work. Alongside its positive aspects and conveniences it poses numerous risks to uninformed users. This publication aims to cast light on the aspects of the method of sampling operating systems security of network computers, i.e. active fingerprinting of the data link layer and Internet TCP/IP stack layer.

Highlights

  • Fingerprinting is an extremely vast issue, considering its origins

  • Remote operating systems detection is reduced to identifying the operating system or applications running on the scanned device which are identified applying methods that uses small differences between implementations of the TCP/IP stack protocols

  • FreeBSD 7.1 supports up to 200 messages per 1 second, and after an overrun it will automatically reduce the number of incoming datagrams per second. – ICMP Message Quoting - operating systems with implemented ICMP protocol react to the error resulting from the failure to transmit a received packet to the specified port number that is closed at the time by sending the feedback message “port unreachable” (“port unreachable”)

Read more

Summary

Introduction

Remote operating systems detection is reduced to identifying the operating system or applications running on the scanned device which are identified applying methods that uses small differences between implementations of the TCP/IP stack protocols With these seemingly insignificant trifles we can successfully gain some very important information from another user without his knowledge. The ways to intercept data are legion, starting from the use of physical devices within the network, such as hotspot WiFi that would purport to be the router of an establishment, e.g. a café or office This option is used by a cybercriminals for capturing or taking control over a legally operating devices during its owner’s inattention or monitoring traffic on the Internet sites via malicious software, e. This option is used by a cybercriminals for capturing or taking control over a legally operating devices during its owner’s inattention or monitoring traffic on the Internet sites via malicious software, e. g. viruses, Trojans, as well as ordinary readable fluctuations in the received packets

Analysis of published data and problem statement
Purpose and objectives of the study
Active fingerprinting of a data link layer
Result
Internet layer
Summary
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.