TCP/IP illustrated (vol. 1): the protocols
TCP/IP illustrated (vol. 1): the protocols
TCP/IP illustrated (vol. 2): the implementation
TCP/IP illustrated (vol. 2): the implementation
Internetworking with TCP/IP vol III (2nd ed.): client-server programming and applications BSD socket version
Internet security attacks at the basic levels
ACM SIGOPS Operating Systems Review
Maximum Security
Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Network support for IP traceback
IEEE/ACM Transactions on Networking (TON)
Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Computer network information discovery based on information fusion
ICCOMP'05 Proceedings of the 9th WSEAS International Conference on Computers
Semi-supervised approach to rapid and reliable labeling of large data sets
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
MitiBox: camouflage and deception for network scan mitigation
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Data reduction by identification and correlation of TCP/IP attack attributes for network forensics
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Show me the money: characterizing spam-advertised revenue
SEC'11 Proceedings of the 20th USENIX conference on Security
Computer vulnerability evaluation using fault tree analysis
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Port scan behavior diagnosis by clustering
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Networking Recon: Network reconnaissance
Network Security
Automatic security assessment for next generation wireless mobile networks
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Hi-index | 0.00 |
This paper reports the most important techniques used by TCP port scanners. TCP port scanners are specialized programs used to determine what TCP ports of a host have processes listening on them for possible connections. Since these ports characterize, in part, the amount of exposure of the hosts to potential external attacks, knowing their existence is a fundamental matter for network and/or security administrators. Moreover, as scanners are also used by hackers, administrators need to know how they work and what possible weakness they exploit to be able to prevent unwanted scanning or at least to record each scanning attempt.