M. Juraev NETWORK FLOW MONITORING SOFTWARE
Keywords:
port scan, network monitoring, port scaner, port, packetAbstract
The article discusses the ability to check open and closed ports, analyze network traffic, and monitor IP addresses through network monitoring. Port scanning enables the quick detection of threats occurring on the network. It is a widely used method in network security and monitoring. Identifying and analyzing open and closed ports is essential for network administrators. Each port scanning method has its unique advantages. Detecting open and closed ports via TCP is one of the primary methods of network scanning. TCP (Transmission Control Protocol) is a network protocol. Identifying network threats is an effective way to prevent risks.
References
Park, Seongchul & Kim, Juntae. (2017). A Study on Risk Index to Analyze the Impact of Port Scan and to Detect Slow Port Scan in Network Intrusion Detection. Advanced Science Letters. 23. 10329-10336. 10.1166/asl.2017.10446.
Vivo, Marco & Ke, Le & Isern, Germinal & Vivo, Gabriela. (1999). A review of port scanning techniques. Computer Communication Review. 29. 41-48. 10.1145/505733.505737.
Mirza, Ali. (2023). Port Scanning: Techniques, Tools and Detection. 10.31224/3053.
Bhuyan, Monowar & Bhattacharyya, Dhruba K & Kalita, Jugal. (2011). Surveying Port Scans and Their Detection Methodologies. The Computer Journal. 54. 1565-1581. 10.1093/comjnl/bxr035.
Majed, Hussein & Noura, Hassan & Salman, Ola & Chehab, Ali & Couturier, Raphaël. (2021). Efficient and Secure Statistical Port Scan Detection Scheme. 10.1007/978-3-030-67550-9_6.
S. Balram and M. Wiscy. Detection of tcp syn scanning using packet countsand neural network. In 2008 IEEE International Conference on Signal ImageTechnology and Internet Based Systems, pages 646–649, 2008.
Additional Files
Published
How to Cite
License
Copyright (c) 2024 Ma'ruf Jo'rayev

This work is licensed under a Creative Commons Attribution 4.0 International License.