Order Now
Menu
  Back to all posts Science and Technology Essays

Ping Sweeps and Port Scans

by Expert Prof. Excellence | 14 Feb 2017

THESIS STATEMENT

Network probes, such as port scans and ping sweeps, can lead to intrusion of private systems of a company or network, enabling the intruders to gain access and change, or worst, ruin the settings of vulnerable target machines which can also ruin the whole company system as well, however, due to the advancement in technology, such activity can be detected and prevented using special tools.

Need essay sample on

"Ping Sweeps and Port Scans" topic?

We will write a custom essay sample specifically for you

Proceed

INTRODUCTION

Ping Sweeps and Port Scans are two most common network probes which serve as important clues in sensing invasion or intrusion that can harm the network's systems of machines. Though network probes are not truly intrusions, however, they may be potential causes of actual intrusions in the future (Theo, 2000). To avoid such circumstances, it is better that we have knowledge about how probes are performed and how we can detect them.

PORT SCANS

Port Scanning can discover the services running on a target machine giving the intruder a chance to study the whole system, making it easy for him to make a plan on how to attack any susceptible and defenseless service that he finds. For example, if an intruder finds any open port, such as port 143, he will observe what running IMAP version is on the target. If the version is weak, he can have an access to the machine using an "exploit" (Theo, 2000).

How is it performed? You just need to connect a series of ports on the machine, finding which ones respond and which don't. A good programmer can write a simple port scanner in just fifteen minutes using Java or Perl language. On the other hand, this kind of port scan is easily detected by the operating system of the target machine (Theo, 2000).

A tool called "scanlogd", developed by the Solar Designer, is a dæmon running in a background and listening on the network boundary for port scans. The scanlogd recounts the detected port scan through inscribing a line using the syslog mechanism (Theo, 2000).

PING SWEEPS

In ping sweeps, a set of ICMP ECHO packets is being sent to a system of machines, specifically a range of IP addresses, and find out which ones will react. Active machines that respond will be the potential target of the intruder; from there he will focus on attacking and working on these machines. However, ping sweeps is sometimes performed by the network legitimately to find out which machines are alive for diagnostic reasons (Theo, 2000).

Like port scans, ping sweeps can be detected using a special tool. ippl, an IP protocol logger, can log TCP, UDP, and ICMP packets. It works like the scanlogd, wherein it sits in the background and snoop for packets (Theo, 2000).

CONCLUSION

Since network probing activities like port scans and ping sweeps can be detected and prevented using special tools, there is no need to worry on possible intrusions of network systems and machines. Network machines needed to be secured with these special tools to avoid intrusions through probes.

There are still many types of network probes which are significantly maturing today, however, these activities can still be detected also using the advancement in technology and proper skills and knowledge.

REFERENCES

  • Teo, L. (1 December 2000). Networks Probes Explained: Understanding Port Scans and Ping Sweeps. Retrieved 22 November 2007 from http://www.linuxjournal.com/article/4234
  • Thompson Course Technology. Port Scanning. [electronic version] . Hands-On Ethical Hacking and Network Defense. Chapter 5.
Learn more:
Professional Practices and Power Lines Productivity Paradox: Implications and Challenges A Deeper Look into Sony’s Woes: A Strategic Analysis

Do You need a paper on this topic?

Order Your Essay
Writer avatar

Burton (Ph.D.)

№19 In global rating

330

finished papers

213

customer reviews

95%

success rate

Writer avatar

Keyla_papers

№9 In global rating

134

finished papers

90

customer reviews

100%

success rate

Writer avatar

Alpoem

№4 In global rating

43

finished papers

38

customer reviews

100%

success rate

Writer avatar

Prof. Cecil

№5 In global rating

417

finished papers

249

customer reviews

100%

success rate

Writer avatar

Prof.Noor (PhD)

№14 In global rating

111

finished papers

61

customer reviews

100%

success rate

Writer avatar

Cynthia-PhD

№15 In global rating

201

finished papers

138

customer reviews

100%

success rate

Writer avatar

The_Intellectual

№8 In global rating

391

finished papers

234

customer reviews

98%

success rate

Writer avatar

Super_Fast

№2 In global rating

50

finished papers

39

customer reviews

95%

success rate

Writer avatar

Cate PhD

№12 In global rating

50

finished papers

24

customer reviews

95%

success rate

Writer avatar

Tracy (PHD)

№11 In global rating

531

finished papers

332

customer reviews

98%

success rate

Order your paper now!

I need
My email
By clicking “Continue”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related emails.

EssayLab Reviews

  • Jason (student)

    I asked Essay Lab to write an essay for me and received paper the next day after I ordered it! Thank you!

  • Kimberly (student)

    Awesome WORK! If I ever need to write my essay – I will use only EssayLab!

  • Matt (student)

    These people are lifesavers! Just ask – “write me an essay” and they will start right away!

Support contacts

[email protected]