Research Article

An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

Table 1

Output of the fingerprinting tools Nmap and p0f.

OS of the target host⁢Running FPH⁢No defense mechanism
Nmapp0fNmapp0f

Windows XPNNYN
Windows 7NNYY
Windows 10NNYYF
Ubuntu 10.10NNFYY
Ubuntu 11.10NNYY
Ubuntu 14.04NNFYN

N: attacker fails to fingerprint the target host. NF: attacker falsely identifies the OS. Y: attacker succeeds to identify the OS. YF: attacker succeeds to identify the OS type but falsely identify the OS version.