Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

Port Scanning Techniques Tools and Detection

Version 1 : Received: 16 February 2024 / Approved: 5 March 2024 / Online: 5 March 2024 (06:30:01 CET)

How to cite: Coyle, S. Port Scanning Techniques Tools and Detection. Preprints 2024, 2024030225. https://doi.org/10.20944/preprints202403.0225.v1 Coyle, S. Port Scanning Techniques Tools and Detection. Preprints 2024, 2024030225. https://doi.org/10.20944/preprints202403.0225.v1

Abstract

This review aims to consolidate varied information regarding Port Scanning, and examine the tools, techniques, and detection algorithms used. It explores TCP SYN, Full TCP, UDP, and stealth scans, and shows their functions and abilities. Paired with these techniques, it also shows the tools that they can be used by, such as NMap, Zmap, and MASSCAN. It discusses the various detection techniques such as Signature and Anomaly based detection, and discusses the real world impact of this technology, while commenting on the legal and ethical issues posed.

Keywords

Port Scanning; TCP; TCP SYN; UDP; Stealth Scan; ZMap; NMap; MASSCAN; Anomaly based detection; Signature based detection

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.