Prevention of operating system identification through...

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S013000, C726S014000

Reexamination Certificate

active

09900001

ABSTRACT:
Outgoing data units, such as packets, from a computer system that contain data characteristic of an operating system executing on the computer system are intercepted before they are transmitted on a network and masked to impersonate a different operating system if the network is untrusted. The masking may be to re-fingerprint the data units by replacing the data characteristic of the actual operating system with data characteristic of the different operating system. Alternatively, the masking may require discarding the data unit and not transmitting it.

REFERENCES:
patent: 5606668 (1997-02-01), Shwed
patent: 5835726 (1998-11-01), Shwed et al.
patent: 6006328 (1999-12-01), Drake
patent: 6073209 (2000-06-01), Bergsten
patent: 6247148 (2001-06-01), Annicchiarico et al.
patent: 6253321 (2001-06-01), Nikander et al.
patent: 6289463 (2001-09-01), Fink
patent: 6397335 (2002-05-01), Franczek et al.
patent: 6651132 (2003-11-01), Traut
patent: 6678734 (2004-01-01), Haatainen et al.
patent: 6687762 (2004-02-01), Van Gaasbeck et al.
patent: 6757841 (2004-06-01), Gitlin et al.
patent: 6779039 (2004-08-01), Bommareddy et al.
patent: 2002/0083344 (2002-06-01), Vairavan
patent: 2006/0206892 (2006-09-01), Vega et al.
patent: 2006/0242704 (2006-10-01), Aviani et al.
Bellovin et al, Network Firewalls, 1994, IEEE, pp. 50-57.
Mazieres et al, Secure Applications Need Flexible Operating Systems, 1997, IEEE, pp. 56-61.
Epstein et al, Using Operating System Wrappers to Increase the Resiliency of Commercial Firewalls, 2000, IEEE, pp. 236-245.
Pogue, David, Making Windows More Secure, 2004, The New York Times, p. G.1.
“Falsify Your BSD OS Fingerprint”, http://www.pkcrew.org/tools.html, provided by Cthulhu, Oct. 2, 2001, 1 page.
“Network Scanning Techniques, Understanding How It Is Done”, Ofir Arkin Publication Communications Solutions, Nov. 1999, pp. 1-17.
“ICMP Stands For Trouble”, Rik Farrow, Network Magazine, Sep. 5, 2000, www.networkmagazine.com/article/NMG20000829S0003, 4 pages, Apr. 23, 2001.
“ICMP Usage In Scanning”, Ofir Arkin, Jul. 2000, pp. 1-45.
“ICMP Usage In Scanning Or Understanding Some Of The ICMP Protocol's Hazards”, Ofir Arkin, Founder—The Sys-Security Group, Version 2.5, Dec. 2000, pp. 1-9 43-45, 59, 68, 74, 77, 84, 87, 89, 107.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Prevention of operating system identification through... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Prevention of operating system identification through..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Prevention of operating system identification through... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3871977

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.