Research Article
An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks
Table 1
Output of the fingerprinting tools Nmap and p0f.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||
N: attacker fails to fingerprint the target host. NF: attacker falsely identifies the OS. Y: attacker succeeds to identify the OS. YF: attacker succeeds to identify the OS type but falsely identify the OS version. |