A deception based approach for defeating OS and service fingerprinting.
Massimiliano AlbaneseErmanno BattistaSushil JajodiaPublished in: CNS (2015)
Keyphrases
- operating system
- web services
- open source
- service quality
- service oriented
- virtual machine
- service providers
- incomplete information
- database
- processor sharing
- end users
- service composition
- steady state
- database manager
- mobile services
- information services
- markov chain
- management system
- web pages
- search engine
- information retrieval