Port scanning method

A technology of port scanning and waiting to be scanned, applied in the field of port scanning, can solve problems such as prolonging scanning time, taking a long time, disturbing judgment, etc., and achieve the effect of improving concealment, avoiding detection, and improving scanning efficiency

Active Publication Date: 2013-04-17
SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current method of evading detection is mainly to disrupt the judgment of the intrusion detection (or defense) system on port scanning by prolonging the scanning time or adding false IPs.
However, such an approach has a certain time limitation, and it takes a long time to complete a task

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Port scanning method
  • Port scanning method
  • Port scanning method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0021] see figure 1 , the first embodiment of the present invention provides a port scanning method, which can avoid being detected by an intrusion detection system, and the port scanning method includes the following steps:

[0022] Step S101, the client submits the object to be scanned to the control master node in the cloud platform.

[0023] Step S103, the master control node distributes the port scanning task to multiple working nodes in the cloud platform according to the simulated annealing algorithm.

[0024] In this embodiment, the simulated annealing algorithm includes the following content:

[0025] 1. Determine the scanning methods for the target to be scanned of the plurality of working nodes, such as TCP connection scanning, TCP Syn scanning, TCP FIN scanning, TCP Ack scanning, TCP Null scanning, Xmas scanning, UDP sca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a port scanning method, which comprises the following steps that: a client submits a target to be scanned to a control master node in a cloud platform; the control master node distributes a port scanning task to a plurality of working nodes in the cloud platform according to a simulated annealing algorithm; the working nodes perform port scanning on the target to be scanned, and calculate an optimal solution of a constrained parameter, which meets a requirement for an intrusion detection system on port scanning by using the simulated annealing algorithm; the working nodes feed a scanning result back to the control master node, and the control master node processes the scanning result and feeds the scanning result back to the client. The port scanning method can effectively combine and utilize resources of the cloud platform, the scanning efficiency is improved, and the simulated annealing algorithm is combined with the conventional port scanning technique, so that the concealment of the port scanning behavior is improved and the port scanning behavior can be effectively prevented from being detected by the intrusion detection system.

Description

technical field [0001] The invention relates to a port scanning method, in particular to a port scanning method for avoiding being detected by an intrusion detection system. Background technique [0002] In penetration testing, black box testing is designed to simulate the intrusion behavior of an attacker and is carried out without knowing most of the information and knowledge of the client organization. It can be used to test the internal security team's ability to detect and respond to an attack. A black box test mainly includes the following stages: 1. Intelligence collection stage, 2. Threat modeling stage, 3. Vulnerability analysis stage, 4. Penetration attack stage, 5. Post-penetration attack stage, 6. Reporting stage. In the above-mentioned stages, intelligence collection is the premise of the following stages, and port scanning is an important means of intelligence collection. [0003] If an intrusion detection system or an intrusion prevention system is installed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 邱健聪彭贤斌须成忠刘进陈凯陈光华
Owner SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products