Port scanner

Known as: IP Scanner, Portsweep, Portscanned 
Port scanner is an application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2007
2007
Port scanning is the usual precursor to malicious attacks on today's Internet. Although many algorithms have been proposed for… (More)
  • figure 2
  • figure 1
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Large-scale computer network attacks in their final stages can readily be identified by observing very abrupt changes in the… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In this paper, we propose a novel Intrusion Detection System (IDS) architecture utilizing both anomaly and misuse detection… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
This paper describes an experimental approach to determine the correlation between port scans and attacks. Discussions in the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 3
  • figure 4
Is this relevant?
2005
2005
Traffic anomalies and attacks are commonplace in today's networks and identifying them rapidly and accurately is critical for… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Today’s Internet intrusion detection systems (IDSes) moni tor edge networks’ DMZs to identify and/or filter malicious flows… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Attackers routinely perform random portscans of IP addresses to find vulnerable servers to compromise. Network intrusion… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
are becoming a major concern. Our nation’s infrastructure is heavily network based in all industries. However, the nation’s… (More)
  • figure 2
  • figure 4
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2001
Highly Cited
2001
This thesis examines the application of fuzzy systems to the problem of network intmsion detection. Historically, there have been… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 4
Is this relevant?