Skip to main content
Erschienen in:
Buchtitelbild

2024 | OriginalPaper | Buchkapitel

Optimization of Network Mapping for Screening and Intrusion Sensing Devices

verfasst von : Haritima Atri, Amisha Sharma, Tushar Mehrotra, Sandeep Saxena

Erschienen in: Cryptology and Network Security with Machine Learning

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Many of today’s cyberattacks heavily rely on screening addresses over the World Wide Web to find susceptible hardware and software. By keeping track of this scanning activity, you may assess the present situation with regard to several vulnerabilities and their exploitation. Studies examining scanning activity to this point have relied on uninvited traffic obtained from darknets and have concentrated on random screens of the address space. We suggest a method for identifying network scanning threats from both inside and outside the network. Our approach operates on the presumption that every legitimate connection between two computers must typically be accompanied by a DNS resolution; hence, any transfer that is not followed by a DNS inquiry is considered to be an inspection, unless it is permitted by the network’s security protocol. Effective port inspection and sniffing of packet technologies are a must for ensuring strong security. Wiremap, a Python-based port monitoring and packet sniffing programme that makes use of the Scapy library, is introduced in this study. Network administrators, security experts, and penetration testers may evaluate the security posture of their networks using Wiremap’s complete solution. Wiremap’s main goal is to give users a simple, effective tool that lets them scan a target IP address to look for accessible ports and record network data for study. The application takes advantage of the Scapy library’s robust sniffing and packet-dissection capabilities, giving users insights into transmission patterns and possible weaknesses in their networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kumar V, Sangwan OP (2012) Signature based intrusion detection system using Snort. Int J Comput Appl Inf Technol I(III):35–41 Kumar V, Sangwan OP (2012) Signature based intrusion detection system using Snort. Int J Comput Appl Inf Technol I(III):35–41
2.
Zurück zum Zitat Implementing an intrusion detection and prevention system using software-defined networking: defending against port-scanning and denial-of-service attacks Implementing an intrusion detection and prevention system using software-defined networking: defending against port-scanning and denial-of-service attacks
8.
Zurück zum Zitat Tanner NH (2019) Wireshark 24. Wahid A, Firdaus ME, Parenreng JM (2021) The implementation of Wireshark and IPtables firewall collaboration to improve traffic security on network systems. Internet Things Artif Intell J 1(4):249–264 Tanner NH (2019) Wireshark 24. Wahid A, Firdaus ME, Parenreng JM (2021) The implementation of Wireshark and IPtables firewall collaboration to improve traffic security on network systems. Internet Things Artif Intell J 1(4):249–264
15.
Zurück zum Zitat Anderson JP (1980) Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company, Fort Washington, Pennsylvania Anderson JP (1980) Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company, Fort Washington, Pennsylvania
16.
Zurück zum Zitat Martin Roesch (2009) Snort User Manual 2.8.5 Martin Roesch (2009) Snort User Manual 2.8.5
18.
Zurück zum Zitat Kumar V, Pathak V, Sangwan OP (2012) Evaluation of buffer overflow and NIDPS. Int J Comput Sci Emerg Trends (IJCSET) Kumar V, Pathak V, Sangwan OP (2012) Evaluation of buffer overflow and NIDPS. Int J Comput Sci Emerg Trends (IJCSET)
Metadaten
Titel
Optimization of Network Mapping for Screening and Intrusion Sensing Devices
verfasst von
Haritima Atri
Amisha Sharma
Tushar Mehrotra
Sandeep Saxena
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_1

Neuer Inhalt