Abstract. Scan detection and suppression methods are an important means for preventing the disclosure of network information to attackers. However, despite the importance of limiting the information obtained by the attacker, and the wide availability of such scan detection methods, there has been very little research on the evasive scan techniques, which can potentially be used by attackers to avoid detection. In this paper, we first present a novel classification of scan detection methods based on their amnesty policy, since attackers usually take advantage of such policies to evade scan detection methods. Then we propose two novel metrics to measure the resources that an attacker needs to complete a scan without being detected. Following,...
Abstract. A variety of remote sensing attacks allow adversaries to break flow confidentiality and ga...
Network attacks often employ scanning to locate vulnerable hosts and services. Unimpeded scanning ca...
Network attacks often employ scanning to locate vulnerable hosts and services. Unimpeded scanning ca...
Scan detection and suppression methods are an important means for preventing the disclosure of netwo...
© 2005 Ms. Dana ZhangA prelude to most malicious network attacks involves a systematic scan on a tar...
Current scanning detection algorithms are based on an underlying assumption that scanning activity c...
Scans are often used by adversaries to determine the potential weaknesses in a target network or sys...
Network scanning reveals valuable information of accessible hosts over the Internet and their offere...
Recent research years of development of network mainly affected denial of service attacks are a viru...
Network security has become more necessary to personal computer users, organizations, and the milita...
Prior to exploiting a vulnerable service, adversaries perform a port scan to detect open ports on a ...
Network infrastructures have played important part in most daily communications for business industr...
In this paper, we investigate the problem of designing a spectrum scanning strategy to detect an int...
Network scanning is a common, effective technique to search for vulnerable Internet hosts and to exp...
With the increase in the sophistication of cyber-attacks, collaborative defensive approaches such as...
Abstract. A variety of remote sensing attacks allow adversaries to break flow confidentiality and ga...
Network attacks often employ scanning to locate vulnerable hosts and services. Unimpeded scanning ca...
Network attacks often employ scanning to locate vulnerable hosts and services. Unimpeded scanning ca...
Scan detection and suppression methods are an important means for preventing the disclosure of netwo...
© 2005 Ms. Dana ZhangA prelude to most malicious network attacks involves a systematic scan on a tar...
Current scanning detection algorithms are based on an underlying assumption that scanning activity c...
Scans are often used by adversaries to determine the potential weaknesses in a target network or sys...
Network scanning reveals valuable information of accessible hosts over the Internet and their offere...
Recent research years of development of network mainly affected denial of service attacks are a viru...
Network security has become more necessary to personal computer users, organizations, and the milita...
Prior to exploiting a vulnerable service, adversaries perform a port scan to detect open ports on a ...
Network infrastructures have played important part in most daily communications for business industr...
In this paper, we investigate the problem of designing a spectrum scanning strategy to detect an int...
Network scanning is a common, effective technique to search for vulnerable Internet hosts and to exp...
With the increase in the sophistication of cyber-attacks, collaborative defensive approaches such as...
Abstract. A variety of remote sensing attacks allow adversaries to break flow confidentiality and ga...
Network attacks often employ scanning to locate vulnerable hosts and services. Unimpeded scanning ca...
Network attacks often employ scanning to locate vulnerable hosts and services. Unimpeded scanning ca...