2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) 2020
DOI: 10.1109/cyberc49757.2020.00020
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Detection Approach of Nmap: Principles, Rules and Experiments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
14
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 10 publications
2
14
0
Order By: Relevance
“…This valuable information might involve exploitation in later stages. In our research work, we consider a Nmap tool for security auditing and network scanning attack 39 . This tool scans the entire network and discovers a variety of information about connected devices, hosts in operating, services running, firewalls, and so on 40 .…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This valuable information might involve exploitation in later stages. In our research work, we consider a Nmap tool for security auditing and network scanning attack 39 . This tool scans the entire network and discovers a variety of information about connected devices, hosts in operating, services running, firewalls, and so on 40 .…”
Section: Methodsmentioning
confidence: 99%
“…In our research work, we consider a Nmap tool for security auditing and network scanning attack. 39 This tool scans the entire network and discovers a variety of information about connected devices, hosts in operating, services running, firewalls, and so on. 40 Therefore, we consider the Nmap tool for different reconnaissance like UDP, TCP SYN, XMAS Tree, FIN scan, and OS Fingerprinting.…”
Section: Machines Type Ip Address Specificationmentioning
confidence: 99%
“…Nmap is a free tool that lets you create a complete network map, including computers, servers, services provided by each machine, and open ports [16,17].…”
Section: System Administration Strategy For Securitymentioning
confidence: 99%
“…In response to the above problems, many network security engineers have launched a variety of network asset scanning and vulnerability detection tools. Among them, Nmap [11,12], Masscan [11], Wappalyzer [13], Whatweb [14], zgrab2 [15,16], and other scanning and detection tools for a specific problem are more typical, and there are more mature integrated scanning and detection tools such as Goby [17] and Vxscan [18]. As a relatively advanced and mature integrated scanning and detection tool in related fields, Goby has a relatively comprehensive scanning and detection function, which can better meet the needs of the above scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, it is very necessary to build a network asset management and vulnerability detection system based on distributed clusters. In summary, this paper has absorbed the advantages of integrated scanning and detection tools such as Goby, integrated the functions of existing scanning and detection tools such as Nmap [11,12], Masscan [11], Whatweb [14], zgrab2 [15,16], etc., and proposed a set of network asset management and vulnerability detection system based on the distributed cluster (Dis-NDVW). Specifically, it has the following advantages:…”
Section: Introductionmentioning
confidence: 99%