Towards a taxonomy of intrusion-detection systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
Practical automated detection of stealthy portscans
Journal of Computer Security
Internet intrusions: global characteristics and prevalence
SIGMETRICS '03 Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Characteristics of internet background radiation
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
InetVis, a visual tool for network telescope traffic analysis
AFRIGRAPH '06 Proceedings of the 4th international conference on Computer graphics, virtual reality, visualisation and interaction in Africa
Survey and taxonomy of packet classification techniques
ACM Computing Surveys (CSUR)
Model Driven Architecture and Ontology Development
Model Driven Architecture and Ontology Development
Snort Intrusion Detection and Prevention Toolkit
Snort Intrusion Detection and Prevention Toolkit
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Assessing the usability of end-user security software
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Hi-index | 0.00 |
Network scanning is a common reconnaissance activity in network intrusion. Despite this, it's classification remains vague and detection systems in current Network Intrusion Detection Systems are incapable of detecting many forms of scanning traffic. This paper presents a classification of network scanning and illustrates how complex and varied this activity is. The presented classification extends previous, well known, definitions of scanning traffic in a manner which reflects this complexity.