Port scanning method and device

A port scanning, port technology, applied in the network field

Active Publication Date: 2019-10-25
HANGZHOU DT DREAM TECH
View PDF16 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, when encountering the above-mentioned security devices, no matter whether the port of the IP address is successful or not, the scanning results are all open, which will generate a large number of false positives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Port scanning method and device
  • Port scanning method and device
  • Port scanning method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] For reference and clarity, technical terms, abbreviations or abbreviations used hereinafter are summarized as follows:

[0038] Nmap: Network Mapper, Nmap was originally a network scanning and sniffing toolkit under Linux;

[0039] TCP / IP: Transmission Control Protocol / Internet Protocol, Transmission Control Protocol / Internet Protocol;

[0040] SYN: Synchronize Sequence Numbers, synchronization sequence number, SYN is the handshake signal used when TCP / IP establishes a connection;

[0041] ACK: Acknowledgment, confirmation character. In data communication, a transmission-type control character sent by the receiver to the sender, indicating that the sent data has been confirmed to be received correctly;

[0042] Nginx: engine x. Nginx is a high-performance HTTP and reverse proxy web server, and also provides IMAP / POP3 / SMTP services;

[0043] Vulnerability scanning: Vulnerability scanning refers to a security detection (penetration attack) behavior that detects the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a port scanning method and device so as to reduce scanning misinformation. According to the port scanning method, ports are scanned in two times, the first time of scanning is pre-scanning, in the pre-scanning process, all the ports of IP addresses are not scanned one by one, a target service port is scanned according to a pre-scanning port list, and a pre-scanning result indicating whether the target service port is opened or not is obtained. And then, the exclusion list is updated according to the pre-scanning result, and the second scanning carried out after the exclusion list is updated is formal scanning. Due to the fact that the IP addresses and the network segments in the exclusion list are pre-judged, the IP addresses and the network segments which are misreported at a large probability cannot be scanned in formal scanning, misreporting of formal scanning can be reduced, and the scanning efficiency and accuracy are guaranteed.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a port scanning method and device. Background technique [0002] Port scanning technology is widely used in scenarios such as asset discovery and vulnerability scanning. [0003] The traditional port scanning method will scan each port of each IP address one by one, and obtain the scanning result whether it is open or not. However, if a security device (such as a firewall) is deployed on a certain network segment, a large number of false positives may be generated. [0004] Taking the stateless scanning method as an example, a SYN packet will be sent to the other party, and the port is considered open only if the other party returns an ACK. However, some security devices reply ACK packets to the SYN packets sent by scanning. Therefore, when encountering the above-mentioned security devices, no matter whether the port of the IP address is successful or not, the scanning results...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
CPCH04L43/10H04L43/16H04L63/14
Inventor 许祥
Owner HANGZHOU DT DREAM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products