2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) 2017
DOI: 10.23919/inm.2017.7987415
|View full text |Cite
|
Sign up to set email alerts
|

Knowledge discovery of port scans from darknet

Abstract: Abstract-Port scanning is widely used in Internet prior for attacks in order to identify accessible and potentially vulnerable hosts. In this work, we propose an approach that allows to discover port scanning behavior patterns and group properties of port scans. This approach is based on graph modelling and graph mining. It provides to security analysts relevant information of what services are jointly targeted, and the relationship of the scanned ports. This is helpful to assess the skills and strategy of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 14 publications
(16 reference statements)
0
15
0
Order By: Relevance
“…In van Riel and Irwin, the authors presented an animated 3‐D scatter plot visualization of port scanning on darknet data. Lagraa and François presented the discovery of vertical port scans from Darknet. They performed a deep analysis of port scan‐based attacks by proposing a graph model‐based approach to analyze/understand them.…”
Section: Background and Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In van Riel and Irwin, the authors presented an animated 3‐D scatter plot visualization of port scanning on darknet data. Lagraa and François presented the discovery of vertical port scans from Darknet. They performed a deep analysis of port scan‐based attacks by proposing a graph model‐based approach to analyze/understand them.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The originality of our approach compared with the related works is that first, it focuses on a specific problem, which is a port scanning, by extending a previous work . We aim to provide a generic and automatic port scanning profiling approach over darknet data.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Here, a swift reaction on threats in communication infrastructures is crucial for proper operation of networks, e.g., as shown in case of distributed denial of service attacks (Lagraa and Francois 2017). Detecting a possible threat early, e.g., a spreading malware, unauthorized access to resources, or malfunction of individual devices in a network, helps to mitigate or prevent negative impact on network performance or reduces downtime of services.…”
Section: Introductionmentioning
confidence: 99%