2019
DOI: 10.1007/978-3-030-24268-8_5
|View full text |Cite
|
Sign up to set email alerts
|

SuperEye: A Distributed Port Scanning System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…This approach aims to bridge the gap between industry and academia, enhancing the development and effectiveness of Ethical Hacking tools. [56], DFBC [69], ESASCF [73], ESRFuzzer [74], Firmaster [76], IoTFuzzer [83], LTESniffer [88], Lore [87], MaliceScript [92], Owfuzz [108], Pyciuti [118], RT-RCT [124], SVED [133], Scanner++ [125], ShoVAT [128], SuperEye [132], TOR-PEDO [136], UE Security Reloaded [137], Vulcan [142], Vulnsloit [146] Threat Modelling Cairis [60], ESSecA [75], HARMer [81], MAL [91], PenQuest [112], TAMELESS [134] Vulnerability Analysis AIBugHunter [52], ARMONY [53], AVAIN [55], Autosploit [54], Bbuzz [56], Black…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…This approach aims to bridge the gap between industry and academia, enhancing the development and effectiveness of Ethical Hacking tools. [56], DFBC [69], ESASCF [73], ESRFuzzer [74], Firmaster [76], IoTFuzzer [83], LTESniffer [88], Lore [87], MaliceScript [92], Owfuzz [108], Pyciuti [118], RT-RCT [124], SVED [133], Scanner++ [125], ShoVAT [128], SuperEye [132], TOR-PEDO [136], UE Security Reloaded [137], Vulcan [142], Vulnsloit [146] Threat Modelling Cairis [60], ESSecA [75], HARMer [81], MAL [91], PenQuest [112], TAMELESS [134] Vulnerability Analysis AIBugHunter [52], ARMONY [53], AVAIN [55], Autosploit [54], Bbuzz [56], Black…”
Section: Discussionmentioning
confidence: 99%
“…Firmaster [76], Gail-PT [79], HILTI [82], IoTFuzzer [83], JCOMIX [84], LAID [85], Link [86], Lore [87], Mace [89], MaliceScript [92], Masat [93], Mirage [94], Mitch [95], MoScan [96], NAUTILUS [97], NAVEX [98], No Name (CSRF) [101], No Name (TTCN-3) [102], NodeXP [104], OSV [107], ObjectMap [105], Owfuzz [108], PJCT [115], PURITY [117], PentestGPT [113], PhpSAFE [114], Project Achilles [116], Pyciuti [118], RAT [119], ROSploit [123], RT-RCT [124], Revealer [120], RiscyROP [121], Robin [122], SOA-Scanner [130], SVED [133], Scanner++ [125], SerialDetector [127], ShoVAT [128], Snout [129], Spicy [131], SuperEye [132], TChecker [135], TORPEDO [136], UE Security Reloaded [137], VAPE-BRIDGE…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The scanning of ports can be performed from a single-source or coordinated by multiple adversaries. This second approach is not easy to be detected by an IDS because the scanning traces are scattered on different hosts [54] [55]. After recognizing the target, the policy for interrupting a portscan attack finds the IP address of the attacker based on an IP address associated with several flows destined to different ports of the target.…”
Section: Figure 6 Mitigation Module Schemementioning
confidence: 99%
“…On the contrary, attackers hide their identities. The most common information collection technology is scanning technology [ 5 , 6 ], which includes architecture detection and utilization of information services.…”
Section: Introductionmentioning
confidence: 99%