The goal of this research is to increase attacker workload by camouflaging servers. Server vulnerabilities are dependent on the specific operating system or server type, version, service pack, and/or patch level. Protocol definitions offer considerable flexibility to developers, and as a result it is possible to fingerprint a particular server by communicating with it using either legitimate or...