Characteristics of Port Scan Traffic: A Case Study Using Nmap
Network ports, essential for communication, become susceptible to port scanning techniques employed by cybersecurity professionals, network administrators, and malicious hackers. The study digs into the specific characteristics of Nmap-generated port scan traffic, examining patterns, behaviors, and...
Saved in:
| Main Authors: | Zaid Al-Khazaali, Ammar Al-Ghabban, Haneen Al-Musawi, Anwar Sabah, Noor Al Mahdi |
|---|---|
| Format: | Article |
| Language: | Arabic |
| Published: |
Mustansiriyah University/College of Engineering
2025-01-01
|
| Series: | Journal of Engineering and Sustainable Development |
| Subjects: | |
| Online Access: | https://jeasd.uomustansiriyah.edu.iq/index.php/jeasd/article/view/2638 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Detection of Hacker Intention Using Deep Packet Inspection
by: Justin Foreman, et al.
Published: (2024-10-01) -
Fast anomalous traffic detection system for secure vehicular communications
by: Qasem Abu Al-Haija, et al.
Published: (2024-12-01) -
Efficient and Standardized Alarm Rationalization for Cybersecurity Monitoring
by: Sarah Alabdulhadi, et al.
Published: (2024-01-01) -
SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare
by: Radjaa Bensaid, et al.
Published: (2024-12-01) -
A novel approach for graph-based real-time anomaly detection from dynamic network data listened by Wireshark
by: Muhammet Onur Kaya, et al.
Published: (2025-01-01)