2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS) 2012
DOI: 10.1109/crisis.2012.6378945
|View full text |Cite
|
Sign up to set email alerts
|

Improving the detection of on-line vertical port scan in IP traffic

Abstract: We propose in this paper an on-line algorithm based on Bloom filters to detect port scan attacks in IP traffic. Only relevant information about destination IP addresses and destination ports are stored in two steps in a two-dimensional Bloom filter. This algorithm can be indefinitely performed on a real traffic stream thanks to a new adaptive refreshing scheme that closely follows traffic variations. It is a scalable algorithm able to deal with IP traffic at a very high bit rate thanks to the use of hashing fu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 14 publications
0
1
0
Order By: Relevance
“…It should be better if author explain the approach to detect failed connection and to update consistence port status. Yousra Chabchoub et al [8] presented an algorithm to identify vertical port scanning attack in the IP traffic. Only destination ports information and destination IP addresses is stored using 2D bloom filter.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It should be better if author explain the approach to detect failed connection and to update consistence port status. Yousra Chabchoub et al [8] presented an algorithm to identify vertical port scanning attack in the IP traffic. Only destination ports information and destination IP addresses is stored using 2D bloom filter.…”
Section: Literature Reviewmentioning
confidence: 99%
“…If a security hole is found, actual attacks will be conducted. Thus it is very important for system administrators and other network defenders to detect port scans as possible preliminaries to a more serious attack [3,4,5,6].…”
Section: Introductionmentioning
confidence: 99%
“…There have been many researches on how to detect port scans [3,4,5,6]. Almost all of them uses threshold values to decide abnormalities.…”
Section: Introductionmentioning
confidence: 99%