Skip to main content
Top
Published in:
Cover of the book

2024 | OriginalPaper | Chapter

Optimization of Network Mapping for Screening and Intrusion Sensing Devices

Authors : Haritima Atri, Amisha Sharma, Tushar Mehrotra, Sandeep Saxena

Published in: Cryptology and Network Security with Machine Learning

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Many of today’s cyberattacks heavily rely on screening addresses over the World Wide Web to find susceptible hardware and software. By keeping track of this scanning activity, you may assess the present situation with regard to several vulnerabilities and their exploitation. Studies examining scanning activity to this point have relied on uninvited traffic obtained from darknets and have concentrated on random screens of the address space. We suggest a method for identifying network scanning threats from both inside and outside the network. Our approach operates on the presumption that every legitimate connection between two computers must typically be accompanied by a DNS resolution; hence, any transfer that is not followed by a DNS inquiry is considered to be an inspection, unless it is permitted by the network’s security protocol. Effective port inspection and sniffing of packet technologies are a must for ensuring strong security. Wiremap, a Python-based port monitoring and packet sniffing programme that makes use of the Scapy library, is introduced in this study. Network administrators, security experts, and penetration testers may evaluate the security posture of their networks using Wiremap’s complete solution. Wiremap’s main goal is to give users a simple, effective tool that lets them scan a target IP address to look for accessible ports and record network data for study. The application takes advantage of the Scapy library’s robust sniffing and packet-dissection capabilities, giving users insights into transmission patterns and possible weaknesses in their networks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kumar V, Sangwan OP (2012) Signature based intrusion detection system using Snort. Int J Comput Appl Inf Technol I(III):35–41 Kumar V, Sangwan OP (2012) Signature based intrusion detection system using Snort. Int J Comput Appl Inf Technol I(III):35–41
2.
go back to reference Implementing an intrusion detection and prevention system using software-defined networking: defending against port-scanning and denial-of-service attacks Implementing an intrusion detection and prevention system using software-defined networking: defending against port-scanning and denial-of-service attacks
8.
go back to reference Tanner NH (2019) Wireshark 24. Wahid A, Firdaus ME, Parenreng JM (2021) The implementation of Wireshark and IPtables firewall collaboration to improve traffic security on network systems. Internet Things Artif Intell J 1(4):249–264 Tanner NH (2019) Wireshark 24. Wahid A, Firdaus ME, Parenreng JM (2021) The implementation of Wireshark and IPtables firewall collaboration to improve traffic security on network systems. Internet Things Artif Intell J 1(4):249–264
15.
go back to reference Anderson JP (1980) Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company, Fort Washington, Pennsylvania Anderson JP (1980) Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company, Fort Washington, Pennsylvania
16.
go back to reference Martin Roesch (2009) Snort User Manual 2.8.5 Martin Roesch (2009) Snort User Manual 2.8.5
18.
go back to reference Kumar V, Pathak V, Sangwan OP (2012) Evaluation of buffer overflow and NIDPS. Int J Comput Sci Emerg Trends (IJCSET) Kumar V, Pathak V, Sangwan OP (2012) Evaluation of buffer overflow and NIDPS. Int J Comput Sci Emerg Trends (IJCSET)
Metadata
Title
Optimization of Network Mapping for Screening and Intrusion Sensing Devices
Authors
Haritima Atri
Amisha Sharma
Tushar Mehrotra
Sandeep Saxena
Copyright Year
2024
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_1