A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Allocation Schemes, Architectures, and Policies for Collaborative Port Scanning Attacks
2011
Journal of Emerging Technologies in Web Intelligence
Most network attackers perform port scanning individually, without synchronization, to find victim hosts. Such port scanning schemes suffer from two problems: first, there are too many duplicate scannings and too much contention among different port scanners; second, a complete port scanning takes a long time to finish. In this paper, we present a fast DHT-based collaborative port scanning scheme that aims to eliminate duplicate scanning, minimize contention, and significantly increase the
doi:10.4304/jetwi.3.2.154-167
fatcat:bamppop65ffihk7z4tz43qe5k4