Review
Version 1
Preserved in Portico This version is not peer-reviewed
Port Scanning Techniques Tools and Detection
Version 1
: Received: 16 February 2024 / Approved: 5 March 2024 / Online: 5 March 2024 (06:30:01 CET)
How to cite: Coyle, S. Port Scanning Techniques Tools and Detection. Preprints 2024, 2024030225. https://doi.org/10.20944/preprints202403.0225.v1 Coyle, S. Port Scanning Techniques Tools and Detection. Preprints 2024, 2024030225. https://doi.org/10.20944/preprints202403.0225.v1
Abstract
This review aims to consolidate varied information regarding Port Scanning, and examine the tools, techniques, and detection algorithms used. It explores TCP SYN, Full TCP, UDP, and stealth scans, and shows their functions and abilities. Paired with these techniques, it also shows the tools that they can be used by, such as NMap, Zmap, and MASSCAN. It discusses the various detection techniques such as Signature and Anomaly based detection, and discusses the real world impact of this technology, while commenting on the legal and ethical issues posed.
Keywords
Port Scanning; TCP; TCP SYN; UDP; Stealth Scan; ZMap; NMap; MASSCAN; Anomaly based detection; Signature based detection
Subject
Computer Science and Mathematics, Security Systems
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment