Please wait a minute...
Chinese Journal of Engineering Design  2011, Vol. 18 Issue (1): 58-61    DOI:
english     
Research on an improved section identification scanning system
 YANG  Ling1, CHENG  Yong2, SUN  Xiao-Cong3
1.Binjiang College, Nanjing University of Information Science and Technology, Nanjing210044, China;
2.Jiangsu Technology and Engineering Center for Meteorological Sensor Network, 
Nanjing University of Information Science and Technology, Nanjing 210044, China;
3. Computer School, Wuhan University, Wuhan 430072, China
Download: HTML     PDF(2718KB)
Export: BibTeX | EndNote (RIS)      

Abstract  Due to the heterogeneity of network and firewall, IDS
monitoring, network scanning often encounter unexpected obstacles. In order to have the
situation of network security well in hand, we need to research the convert network
scanning techniques. This paper designed a covert network scanning system which used lots
of popular network scanning technologies and made scanning even more secret by optimizing
the scanning ports, slowing down the scanning and forging data packets. This thesis
presented an improvement of the IPID scanning technique which named random chunk binary
algorithm and improved the efficiency of the ordinary.


Key wordsnetwork scanning      port scanning      OS scanning      covert network scanning      IPID scanning     
Published: 28 February 2011
CLC:  TN 911.72  
Cite this article:

YANG Ling, CHENG Yong, SUN Xiao-Cong. Research on an improved section identification scanning system. Chinese Journal of Engineering Design, 2011, 18(1): 58-61.

URL:

https://www.zjujournals.com/gcsjxb/     OR     https://www.zjujournals.com/gcsjxb/Y2011/V18/I1/58


一种改进的分段标识扫描系统的研究

由于网络的异构性,防火墙和入侵检测系统的监测,扫描过程中往往遇到不期望的阻碍.为了能更好把握主机和网络的安全状况,需要对网络扫描系统的隐蔽性进行研究.设计了具有一定隐蔽性的网络扫描系统,实现了多种当前流行的网络扫描技术,通过优化扫描端口、减慢扫描速度、伪造垃圾数据包等手段增强扫描的隐蔽性;并对IPID扫描技术进行了改进,提出了一种名为随机分块二分法的改进算法,提高了普通IPID扫描的效率.

关键词: 网络扫描,  端口扫描,  操作系统扫描,  隐蔽性网络扫描,  IPID扫描 
[1]DE VIVO Marco, CARRASCO Eddy, ISERN Germinal, et al. A review of port scanning techniques[J]. Computer Communications Review, 1999, 29(2): 41-48. 

[2]刘咏. 网络安全性能测试平台之端口扫描研究及实现[D]. 成都:四川大学, 2004.

LIU Yong. The network security tests of platform system port scan agent of study and realizing [D]. Chengdu: Sichuan University, 2004.

[3]蒋卫华, 李伟华, 杜君. 网络扫描隐蔽性分析[J]. 计算机应用研究,2003,20(12):93-95.

JIANG Wei-hua, LI Wei-hua, DU Jun. On the concealment of network scanning [J].Application Research of Computers, 2003, 20(12):93-95.

[4]陈璟, 戴祖峰. 一种新的端口扫描技术——Idle扫描[J]. 信息安全与通信保密,2004,12(2):38-40.

CHEN Jing, DAI Zu-feng. A new port scanning technology—Idle scanning [J]. ChinaInformation Security, 2004,12(2):38-40.
No related articles found!