4.4 Article

Surveying Port Scans and Their Detection Methodologies

期刊

COMPUTER JOURNAL
卷 54, 期 10, 页码 1565-1581

出版社

OXFORD UNIV PRESS
DOI: 10.1093/comjnl/bxr035

关键词

TCP; IP; UDP; OS fingerprinting; coordinated scanning

资金

  1. DIT
  2. Department of Information Technology, Government of India
  3. Division Of Computer and Network Systems
  4. Direct For Computer & Info Scie & Enginr [0958576] Funding Source: National Science Foundation

向作者/读者索取更多资源

Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of Internet protocol addresses to find vulnerable hosts to compromise. However, it is also useful for system administrators and other network defenders to detect port scans as possible preliminaries to more serious attacks. It is a very difficult task to recognize instances of malicious port scanning. In general, a port scan may be an instance of a scan by attackers or an instance of a scan by network defenders. In this survey, we present research and development trends in this area. Our presentation includes a discussion of common port scan attacks. We provide a comparison of port scan methods based on type, mode of detection, mechanism used for detection and other characteristics. This survey also reports on the available data sets and evaluation criteria for port scan detection approaches.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据