Machine Learning and Port Scans: A Systematic Review

01/31/2023
by   Jason M. Pittman, et al.
0

Port scanning is the process of attempting to connect to various network ports on a computing endpoint to determine which ports are open and which services are running on them. It is a common method used by hackers to identify vulnerabilities in a network or system. By determining which ports are open, an attacker can identify which services and applications are running on a device and potentially exploit any known vulnerabilities in those services. Consequently, it is important to detect port scanning because it is often the first step in a cyber attack. By identifying port scanning attempts, cybersecurity professionals can take proactive measures to protect the systems and networks before an attacker has a chance to exploit any vulnerabilities. Against this background, researchers have worked for over a decade to develop robust methods to detect port scanning. While there have been various surveys, none have focused solely on machine learning based detection schemes specific to port scans. Accordingly, we provide a systematic review of 15 papers published between February 2021 and January 2023. We extract critical information such as training dataset, algorithm used, technique, and model accuracy. We also collect unresolved challenges and ideas for future work. The outcomes are significant for researchers looking to step off from the latest work and for practitioners interested in novel mechanisms to detect the early stages of cyber attack.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/18/2023

Reproducing Random Forest Efficacy in Detecting Port Scanning

Port scanning is the process of attempting to connect to various network...
research
06/17/2020

Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners

The first step of every attack is reconnaissance, i.e., to acquire infor...
research
03/20/2023

A Comparative Analysis of Port Scanning Tool Efficacy

Port scanning refers to the systematic exploration of networked computin...
research
10/05/2021

An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment

While the digitization of power distribution grids brings many benefits,...
research
01/26/2022

Automatic detection of access control vulnerabilities via API specification processing

Objective. Insecure Direct Object Reference (IDOR) or Broken Object Leve...
research
06/28/2021

Automatically Determining a Network Reconnaissance Scope Using Passive Scanning Techniques

The starting point of securing a network is having a concise overview of...
research
02/03/2022

A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools

Asset scanning and discovery is the first and foremost step for organiza...

Please sign up or login with your details

Forgot password? Click here to reset