A Comparative Analysis of Port Scanning Tool Efficacy

03/20/2023
by   Jason M. Pittman, et al.
0

Port scanning refers to the systematic exploration of networked computing systems. The goal of port scanning is to identify active services and associated information. Although this technique is often employed by malicious actors to locate vulnerable systems within a network, port scanning is also a legitimate method employed by IT professionals to troubleshoot network issues and maintain system security. In the case of the latter, cybersecurity practitioners use port scanning catalog exposed systems, identify potential misconfigurations, or test controls that may be running on a system. Existing literature has thoroughly established a taxonomy for port scanning. The taxonomy maps the types of scans as well as techniques. In fact, there are several tools mentioned repeatedly in the literature. Those are Nmap, Zmap, and masscan. Further, the presence of multiple tools signals that how a port scanner interacts with target systems impacts the output of the tool. In other words, the various tools may not behave identically or produce identical output. Yet, no work has been done to quantify the efficacy for these popular tools in a uniform, rigorous manner. Accordingly, we used a comparative experimental protocol to measure the accuracy, false positive, false negative, and efficiency of Nmap, Zmap, and masscan. The results show no difference between port scanners in general performance. However, the results revealed a statistically significant difference in efficiency. This information can be used to guide the selection of port scanning tools based on specific needs and requirements. As well, for researchers, the outcomes may also suggest areas for future work in the development novel port scanning tools.

READ FULL TEXT

page 2

page 3

research
02/03/2022

A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools

Asset scanning and discovery is the first and foremost step for organiza...
research
01/31/2023

Machine Learning and Port Scans: A Systematic Review

Port scanning is the process of attempting to connect to various network...
research
02/18/2023

Reproducing Random Forest Efficacy in Detecting Port Scanning

Port scanning is the process of attempting to connect to various network...
research
06/17/2020

Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners

The first step of every attack is reconnaissance, i.e., to acquire infor...
research
05/26/2020

A Taxonomy for Dynamic Honeypot Measures of Effectiveness

Honeypots are computing systems used to capture unauthorized, often mali...
research
08/27/2015

Rapid Exact Signal Scanning with Deep Convolutional Neural Networks

A rigorous formulation of the dynamics of a signal processing scheme aim...
research
03/16/2021

EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry

Backdoor attack injects malicious behavior to models such that inputs em...

Please sign up or login with your details

Forgot password? Click here to reset