2011
DOI: 10.1093/comjnl/bxr035
|View full text |Cite
|
Sign up to set email alerts
|

Surveying Port Scans and Their Detection Methodologies

Abstract: Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of IP addresses to find vulnerable hosts to compromise. However, it is also useful for system administrators and other network defenders to detect port scans as possible preliminaries to more serious attacks. It is a very difficult task to recognize instances of malicious port scanning. In general, a port scan may be an instance of a scan by attackers or an instance of a scan by network defenders. In this survey,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
67
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 125 publications
(67 citation statements)
references
References 48 publications
0
67
0
Order By: Relevance
“…A wide variety of scan detection methods have been surveyed in [2]. Perhaps the most influential and significant of those is that of [1], in which the TRW method is proposed.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A wide variety of scan detection methods have been surveyed in [2]. Perhaps the most influential and significant of those is that of [1], in which the TRW method is proposed.…”
Section: Related Workmentioning
confidence: 99%
“…A highly effective and widely cited method for detecting scanners is the Threshold Random Walk (TRW) algorithm [2]. TRW can often detect single source scanning after only 4 or 5 connection attempts.…”
Section: Introductionmentioning
confidence: 99%
“…These techniques are further divided into sub categories like threshold based, algorithmic based, soft computing based or rule based etc. [8]. TRW and TAPS are two main two port scan detection techniques.…”
Section: Port Scan Detectionmentioning
confidence: 99%
“…These scans can be detected by interpreting access logs or analysing network traffic [24]. Port scanning and vulnerability scan determination have a high accuracy rate.…”
Section: Attack Mechanism Determinationmentioning
confidence: 99%