Ping-Sweep & Port-Scanning

Read Complete Research Material

PING-SWEEP & PORT-SCANNING

Ping-Sweep & Port-Scanning



Ping Sweep & Port Scanning

Ping Sweep in computer science is a technique used by hackers (but not only) to determine the map of the network. This is accomplished through a sequence of commands ping on a specified range of IP addresses or blocks of the network, so as to verify which systems are active. There are different tools that allow this, available for both systems, UNIX, to Windows. One of the variations between a software rather than another, is in the way in which scans. Indeed, some tools are awaiting the response from a machine before proceeding, while others send requests in parallel, reducing scan times.

This technique is used by administrators of computer systems to control security of their network servers. The same technique is also used by hackers to try to find flaws in computer systems. A port scan (port scan portscan or English) performed on a third-party system is generally considered an intrusion attempt, as a port scan is often used to prepare an invasion.

Port Scanning is an activity considered suspicious by an intrusion detection system. A system intrusion detection can be set to different levels of sensitivity. A high sensitivity level will generate more false alarms, a low sensitivity level risks missing scans performed by sophisticated systems such as Nmap, which have various options to cover their scans (Ciampa, 2000; Minoli, 2005). To deceive the vigilance of detection systems and firewall, scans can be done in random order, with a speed too slow (eg several days), or from multiple IP addresses .

Port Scans are usually done on the protocol TCP, however, some software can also perform sweeps UDP. This last feature is much less reliable, UDP is connectionless oriented, service will not respond if the request corresponds to a specific model varies depending ...
Related Ads