2018
DOI: 10.1109/access.2018.2872775
|View full text |Cite
|
Sign up to set email alerts
|

Network Vulnerability Analysis on Brain Signal/Image Databases Using Nmap and Wireshark Tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 44 publications
(13 citation statements)
references
References 17 publications
0
8
0
2
Order By: Relevance
“…Once there is no response, so the attacker recognizes that the port is open but if there's RST response it indicates that the port is closed. (G. Bagyalakshmi et al, 2018) [2] performed a study on network vulnerabilities to catch abnormal activities to implement security management and ensure forensic analysis. Examining the packets and finding out vulnerable ports detected by Wireshark that assist to generate the required information.…”
Section: Related Workmentioning
confidence: 99%
“…Once there is no response, so the attacker recognizes that the port is open but if there's RST response it indicates that the port is closed. (G. Bagyalakshmi et al, 2018) [2] performed a study on network vulnerabilities to catch abnormal activities to implement security management and ensure forensic analysis. Examining the packets and finding out vulnerable ports detected by Wireshark that assist to generate the required information.…”
Section: Related Workmentioning
confidence: 99%
“…Adapun hasil pemindaian dari aplikasi Sudomy pada tahapan ini adalah daftar sub-domain berserta alamat IP Address yang digunakan dengan status aktif digunakan berdasarkan ping sweep. Teknik ping sweep berfungsi untuk mendeteksi suatu host yang berstatus atau dalam kondisi aktif/menyala [11]. Selanjutnya hasil dari temuan menggunakan teknik Ping Sweep dilakukan penyaringan berdasarkan HTTP Status dengan kode 200 karena pengujian yang dilakukan menggunakan sistem informasi yang berbasis web [12].…”
Section: Hasil Dan Pembahasan Information Gatheringunclassified
“…У статті [3] виконано сканування різних інтернет-серверів методами Ping sweep, TCP sweep та Null-сканування, описано їх особливості, подано результати сканування різних ресурсів та їх порівняння. Порівняння можливостей пасивного та активного сканування наводиться у роботі [4].…”
Section: вступunclassified