Prior to exploiting a vulnerable service, adversaries perform a port scan to detect open ports on a target machine. If an adversary is aiming for multiple targets, multiple IP addresses need to be scanned for possible open ports. As sending all this probing traffic with one source IP address causes a lot of suspicion in an intrusion detection system, attackers have adopted towards a more distributed approach by using multiple source IP addresses to perform a port scan. In this paper, we describe various strategies on how a distributed port scan is performed by adversaries in the wild. The results in this paper are found by analyzing network packets that stem from a large network telescope.Concretely, we analyzed network traffic from one mon...
Computer worms randomly perform port-scans to find vulnerable hosts to intrude over the Internet. Ma...
While it is widely known that port scanning is widespread, neither the scanning landscape nor the de...
International audiencePort scanning is widely used in Internet prior for attacks in order to identif...
Port scans are typically at the begin of a chain of events that will lead to the attack and exploita...
Abstract. Computer virus and worms perform randomly spyware and port-scanning to find a vulnerabilit...
In this paper we analyze the coordinated port scan attack where a single adversary coordinates a Gro...
Abstract—Most network attackers perform port scanning in-dividually, without synchronization, to fin...
Over recent years there has been a massive increase in the need to build stronger and more effective...
International audienceTCP/UDP port scanning or sweeping is one of the most common technique used by ...
TCP/UDP port scanning or sweeping is one of the most common technique used 3 by attackers to discove...
This paper describes an experimental approach to determine the correlation between port scans and at...
Current firewalls and intrusion detection systems are generally designed to protect a single gateway...
Scans are often used by adversaries to determine the potential weaknesses in a target network or sys...
Abstract While it is widely known that port scanning is widespread, neither the scanning landscape n...
Large enterprises are nowadays complex interconnected software systems spanning over several domains...
Computer worms randomly perform port-scans to find vulnerable hosts to intrude over the Internet. Ma...
While it is widely known that port scanning is widespread, neither the scanning landscape nor the de...
International audiencePort scanning is widely used in Internet prior for attacks in order to identif...
Port scans are typically at the begin of a chain of events that will lead to the attack and exploita...
Abstract. Computer virus and worms perform randomly spyware and port-scanning to find a vulnerabilit...
In this paper we analyze the coordinated port scan attack where a single adversary coordinates a Gro...
Abstract—Most network attackers perform port scanning in-dividually, without synchronization, to fin...
Over recent years there has been a massive increase in the need to build stronger and more effective...
International audienceTCP/UDP port scanning or sweeping is one of the most common technique used by ...
TCP/UDP port scanning or sweeping is one of the most common technique used 3 by attackers to discove...
This paper describes an experimental approach to determine the correlation between port scans and at...
Current firewalls and intrusion detection systems are generally designed to protect a single gateway...
Scans are often used by adversaries to determine the potential weaknesses in a target network or sys...
Abstract While it is widely known that port scanning is widespread, neither the scanning landscape n...
Large enterprises are nowadays complex interconnected software systems spanning over several domains...
Computer worms randomly perform port-scans to find vulnerable hosts to intrude over the Internet. Ma...
While it is widely known that port scanning is widespread, neither the scanning landscape nor the de...
International audiencePort scanning is widely used in Internet prior for attacks in order to identif...