Analysis of the Technologies for Host and Port Scanning

Article Preview

Abstract:

Host scanning and port scanning are the basis for attacking information system. The technologies commonly used in these scans can be classified as ICMP scanning, TCP scanning and UDP scanning. We analyze these technologies and make comparisons among them. Totally, ICMP are mainly used to discover the host, while the TCP and UDP are mainly for port scanning, except for ACK. At the same time, using certain special TCP datagram such as SYN packets and ACK packets, and UDP datagram, we can make a host scanning in a secret manner.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4286-4289

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] L. Jacquin, V. Roca, M.A. Kaafar and F. Schuler, IBTrack: An ICMP black holes tracker, IEEE Global Communications Conference (GLOBECOM), Dec., (2012), P. 2827-2833.

DOI: 10.1109/glocom.2012.6503545

Google Scholar

[2] H.T. Wu, Z.Q. Feng, C.X. Guo and Y.G. Zhang, CTCP: incast congestion control for TCP in data-center networks, IEEE/ACM Transactions on Networking, 21(2), (2013), P. 345-358.

DOI: 10.1109/tnet.2012.2197411

Google Scholar

[3] C. McNab, J.X. Wang, in: Network Security Assessment, China Electric Power Press (2005).

Google Scholar

[4] P. Engebretson, in: The Basics of Hacking and Penetration Testing, Elsevier, Waltham, (2011).

Google Scholar

[5] U. Thakar, L. Purohit and Pahade, An Approach to Improve Performance of a Packet-filtering Firewall, Ninth International Conference on Wireless and Optical Communications Networks (WOCN), Indore, Sept. (2012), P. 1-5.

DOI: 10.1109/wocn.2012.6335516

Google Scholar

[6] H.Q. Mao, L. Zhu, M.B. Li, Current State and Future Development Trend of Firewall Technology 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Shanghai, Sept., (2012), P. 1- 4.

DOI: 10.1109/wicom.2012.6478472

Google Scholar

[7] V. Verma and S. Dhawan, Comparison and Assessment of TCP& UDP Protocols in Different Network Scenarios, International Journal of Software&Hardware Research in Engineering, 2 (2), (2014), P. 112-115.

Google Scholar