Network Forensics: Detection and Analysis of Stealth Port Scanning Attack


Network administrator performs port scanning for the purpose of network monitoring and troubleshooting on the other hand this facility become vulnerability when attacker performs port scanning for probing networks, searching for vulnerabilities and then infiltrate IT assets. It is often a primarily tactic that is adopted by attacker prior to launching a… (More)


12 Figures and Tables


Citations per Year

Citation Velocity: 9

Averaging 9 citations per year over the last 2 years.

Learn more about how we calculate this metric in our FAQ.

Slides referencing similar topics