{"title":"全端口扫描速度和精度的研究","authors":"Jinxiong Zhao, Lan Yang, Chi Zhang, Jinpeng Zhang","doi":"10.1109/ITNEC56291.2023.10082257","DOIUrl":null,"url":null,"abstract":"As the most basic means of network attack, port scanning is the most commonly used attack tool in penetration testing. Full-port scanning of the system can identify potential threats to the system in advance, however, existing full-port scanning methods need to scan the full amount of ports, which is relatively time-consuming. In this paper, we propose a sampling-based full-port scanning method that can minimize the scanning cost while maintaining the scanning accuracy. We use three port scanning tools to perform port scanning in a controlled environment to validate our method, and quantitatively analyze the scanning accuracy and scanning speed of different scanners in different scenarios. Besides, by analyzing the experimental results, we give a set of solutions for the use of scanners in different environments.","PeriodicalId":218770,"journal":{"name":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","volume":"660 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on the Speed and Accuracy of Full Port Scanning\",\"authors\":\"Jinxiong Zhao, Lan Yang, Chi Zhang, Jinpeng Zhang\",\"doi\":\"10.1109/ITNEC56291.2023.10082257\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the most basic means of network attack, port scanning is the most commonly used attack tool in penetration testing. Full-port scanning of the system can identify potential threats to the system in advance, however, existing full-port scanning methods need to scan the full amount of ports, which is relatively time-consuming. In this paper, we propose a sampling-based full-port scanning method that can minimize the scanning cost while maintaining the scanning accuracy. We use three port scanning tools to perform port scanning in a controlled environment to validate our method, and quantitatively analyze the scanning accuracy and scanning speed of different scanners in different scenarios. Besides, by analyzing the experimental results, we give a set of solutions for the use of scanners in different environments.\",\"PeriodicalId\":218770,\"journal\":{\"name\":\"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)\",\"volume\":\"660 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNEC56291.2023.10082257\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNEC56291.2023.10082257","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on the Speed and Accuracy of Full Port Scanning
As the most basic means of network attack, port scanning is the most commonly used attack tool in penetration testing. Full-port scanning of the system can identify potential threats to the system in advance, however, existing full-port scanning methods need to scan the full amount of ports, which is relatively time-consuming. In this paper, we propose a sampling-based full-port scanning method that can minimize the scanning cost while maintaining the scanning accuracy. We use three port scanning tools to perform port scanning in a controlled environment to validate our method, and quantitatively analyze the scanning accuracy and scanning speed of different scanners in different scenarios. Besides, by analyzing the experimental results, we give a set of solutions for the use of scanners in different environments.