Affiliation:
1. National Application Software Testing Labs
Abstract
Host scanning and port scanning are the basis for attacking information system. The technologies commonly used in these scans can be classified as ICMP scanning, TCP scanning and UDP scanning. We analyze these technologies and make comparisons among them. Totally, ICMP are mainly used to discover the host, while the TCP and UDP are mainly for port scanning, except for ACK. At the same time, using certain special TCP datagram such as SYN packets and ACK packets, and UDP datagram, we can make a host scanning in a secret manner.
Publisher
Trans Tech Publications, Ltd.
Reference7 articles.
1. L. Jacquin, V. Roca, M.A. Kaafar and F. Schuler, IBTrack: An ICMP black holes tracker, IEEE Global Communications Conference (GLOBECOM), Dec., (2012), P. 2827-2833.
2. H.T. Wu, Z.Q. Feng, C.X. Guo and Y.G. Zhang, CTCP: incast congestion control for TCP in data-center networks, IEEE/ACM Transactions on Networking, 21(2), (2013), P. 345-358.
3. C. McNab, J.X. Wang, in: Network Security Assessment, China Electric Power Press (2005).
4. P. Engebretson, in: The Basics of Hacking and Penetration Testing, Elsevier, Waltham, (2011).
5. U. Thakar, L. Purohit and Pahade, An Approach to Improve Performance of a Packet-filtering Firewall, Ninth International Conference on Wireless and Optical Communications Networks (WOCN), Indore, Sept. (2012), P. 1-5.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Identifying SCADA Network Security Through Network Reconnaissance and Firewall Filter;2021 3rd International Symposium on Material and Electrical Engineering Conference (ISMEE);2021-11-10