메뉴 건너뛰기




Volumn 29, Issue 2, 1999, Pages 41-48

A review of port scanning techniques

Author keywords

Coordinated Scanning; Decoy Scanning; FIN Scanning; Fingerprinting; Indirect Scanning; Stealth Scanning; SYN Scanning; TCP IP; Three way Handshake; UDP

Indexed keywords


EID: 0004568554     PISSN: 01464833     EISSN: None     Source Type: Journal    
DOI: 10.1145/505733.505737     Document Type: Review
Times cited : (91)

References (24)
  • 3
    • 0006097718 scopus 로고    scopus 로고
    • Project Neptune
    • Daemon9
    • Daemon9, Project Neptune. Phrack Magazine, Issue 48, 1996.
    • (1996) Phrack Magazine , Issue.48
  • 8
    • 0008877183 scopus 로고    scopus 로고
    • Port Scanning without the SYN flag, TCP port Stealth Scanning
    • Uriel Maimon, Port Scanning without the SYN flag, TCP port Stealth Scanning. Phrack Magazine, Issue 49, 1996.
    • (1996) Phrack Magazine , Issue.49
    • Maimon, U.1
  • 9
    • 84866799674 scopus 로고    scopus 로고
    • NMAP, http://www.insecure.org/nmap/index.html, 1999.
    • (1999)
  • 11
    • 0003241928 scopus 로고    scopus 로고
    • Internet Security Attacks at the Basic Levels
    • SIGOPS, ACM, April
    • M. de Vivo, G. de Vivo, G. Isern, Internet Security Attacks at the Basic Levels. Operating Systems Review, Vol. 32, No. 2. SIGOPS, ACM, April 1998.
    • (1998) Operating Systems Review , vol.32 , Issue.2
    • De Vivo, M.1    De Vivo, G.2    Isern, G.3
  • 12
    • 84866808576 scopus 로고    scopus 로고
    • Naval Surface Warfare Center Dahlgren Division, Code CD2S, Sep Updated Dec 98 and Mar 99
    • SHADOW Indications Technical Analysis, Coordinated Attacks and Probes. Naval Surface Warfare Center Dahlgren Division, Code CD2S, http://www.nswc.navy.mil/ISSEC/CID/ Sep 1998, Updated Dec 98 and Mar 99.
    • (1998) SHADOW Indications Technical Analysis, Coordinated Attacks and Probes
  • 13
    • 84866805952 scopus 로고    scopus 로고
    • Back Orifice, http://www.cultdeadcow.com, 1999.
    • (1999) Back Orifice
  • 14
    • 9744240962 scopus 로고
    • Prentice Hall, Third Edition
    • D. Comer, Internetworking with TCP/IP Vol. 1. Prentice Hall, Third Edition, 1995, pp. 123-137.
    • (1995) Internetworking with TCP/IP , vol.1 , pp. 123-137
    • Comer, D.1
  • 15
    • 84866797526 scopus 로고    scopus 로고
    • IdentTCPscan, www.asmodeus.com/archive/crack-scan/.
    • IdentTCPscan
  • 19
    • 9744225097 scopus 로고    scopus 로고
    • SAMS
    • Anonymus, Maximum Security, Second Ed., SAMS, 1998, pp. 174-202.
    • (1998) Maximum Security , pp. 174-202
  • 20
    • 84866796790 scopus 로고    scopus 로고
    • Index of /∼tattooman/scanners, At www.gcnocide2600.com/∼tattooman/, follow the link to FileArchives, and then to scanners, 1999.
    • (1999) Index of /∼Tattooman/scanners
  • 21
    • 84866801485 scopus 로고    scopus 로고
    • ISS, http://www.iss.net/, 1999.
    • (1999) ISS
  • 22
    • 84866798757 scopus 로고    scopus 로고
    • QueSO, http://www.apostols.org/projectz/queso/
    • QueSO
  • 24
    • 19544392357 scopus 로고    scopus 로고
    • Remote OS detection via TCP/IP Stack FingerPrinting
    • Dec 25th
    • Fyodor, Remote OS detection via TCP/IP Stack FingerPrinting. Phrack Magazine, Volume 8, Issue 54, Dec 25th, 1998. .
    • (1998) Phrack Magazine , vol.8 , Issue.54
    • Fyodor1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.