Network Forensics: Detection and Analysis of Stealth Port Scanning Attack

Abstract

Network administrator performs port scanning for the purpose of network monitoring and troubleshooting on the other hand this facility become vulnerability when attacker performs port scanning for probing networks, searching for vulnerabilities and then infiltrate IT assets. It is often a primarily tactic that is adopted by attacker prior to launching a… (More)

Topics

12 Figures and Tables

Statistics

010203020162017
Citations per Year

Citation Velocity: 9

Averaging 9 citations per year over the last 2 years.

Learn more about how we calculate this metric in our FAQ.

Slides referencing similar topics