Preview

Ping Sweeps and Port Scans

Satisfactory Essays
Open Document
Open Document
449 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ping Sweeps and Port Scans
SEC280
March 10,2011

Ping Sweeps and Port Scans:
Should we worry?

Ping Sweeps and Port Scans are the two most common network probes that serve as important clues in sensing invasion or intrusion that can harm a network. Network probes are not actual intrusions, although, they could be potential causes of actual intrusions. Port scans and ping sweeps can lead to an intrusion of companies network system, however, with today’s technological advancements, these activities can be detected and prevented.
Ping Sweeps; Ping sweeps are a set of ICMP Echo packets that are sent out to network of computers, actually a range of IP addresses, to see if there are any responses. As an intruder sends out the ping sweeps, he looks for responses so he can figure out which machines he can attack. “Note that there are legitimate reasons for performing ping sweeps on a network—a network administrator may be trying to find out which machines are alive on a network for diagnostic reasons. Ping sweeps are detectable using special tools as well. ippl is an IP protocol logger that can log TCP, UDP and ICMP packets. It is similar to scanlogd, where it sits in the background and listens for packets. Be careful when using ippl though—if you 're on a busy Ethernet network, you might find that your ippl log files (usually at /var/log/ippl/*) may fill up rather quickly (Teo, 2000).”
Port Scans; Even though ping sweeps are common, port scans are probably the most common probes and relatively simple to perform. A very simple port scan can be programmed in a few minutes. However, this method can easily be detected and therefore is not used much. “Another sneakier, “stealthier” kind of port scan is called the “half-open” SYN scan. In this scan, the port scanner connects to the port but shuts down the connection right before a full connection occurs (hence the name “half-open”). Since a full connection never happened, the operating system of the target machine usually



References: Teo, L. (2000). Network Probes Explained: Understanding Port Scans and Ping Sweeps. Retrieved on March 10,2011 from: http://www.linuxjournal.com/article/4234?page=0,1

You May Also Find These Documents Helpful

  • Powerful Essays

    2. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    2. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    It’s used for port scanning. It can be used to see what hosts are on the network and to see what services they are running.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    A(n) ____ is a hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Port scanning is the act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks, but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    1. Unauthorized network probing and port scanning. IP router, firewall and network appliance operation system vulnerability.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    week 1 2520

    • 261 Words
    • 2 Pages

    The APR Ping Scan was scanning for host. They SYN Stealth Scan discovered ports opened on the IP address.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    and identify the devices on the network and the operating systems and services running on them.…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 security threats

    • 449 Words
    • 2 Pages

    Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. It lets you capture and interactively browse the traffic running on a computer network. Wireshark is a network protocol and packet analyser,…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Also large numbers of packets caught by your router or firewall's egress filters. Remember that egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because that's a clear sign that machines on your network have been compromised. Unscheduled reboots of server machines may sometimes signify that they are compromised as well. You should already be watching the event logs of your servers for failed logons and other security-related events.…

    • 588 Words
    • 3 Pages
    Good Essays

Related Topics