port scanning

port scanning

Sending queries to servers on the Internet in order to obtain information about their services and level of security. On Internet hosts (TCP/IP hosts), there are standard port numbers for each type of service. Port scanning is also widely used to find out if a network can be compromised. See well-known port. See also port mirroring.
References in periodicals archive ?
First, because intrusive network address and port scanning is not a continuous process it will miss those situations where a database is created and then taken down between scan windows.
A peer-to-peer connection can be exploited by a malicious hacker who may try to then inflict a variety of attacks on the client such as port scanning to explore and exploit client vulnerabilities.
At the same time, IaaS offered the security and protection to resist millions of attacks including network DDoS2, port scanning, and other malicious activities.
In one experiment, some types of malicious activity, like port scanning, were executed for 48 hours in order to see if a large traffic volume and longer attack duration would trigger a response from the cloud provider.
Aanval SAS[TM] is the combination of the most advanced SIEM features coupled with the newly released Network Host Scanner, Rogue Host Detection, and Offensive Reconnaissance[TM] that take full advantage of Nmap, the industry's most well-known and accomplished port scanning utility to perform both automated and on-request network reconnaissance.
It also offers a new port scanning feature which helps check whether any ports may be vulnerable to attack and whether firewalls are configured correctly.
Without the Enforcer, port scanning and tunneling technologies built into these applications allow network P2P traffic to bypass existing network security, including firewalls.
Outpost supports comprehensive port scanning detection.
the leader in total configuration management, has introduced Ecora NetExplorer, a free device discovery and port scanning utility available for download at https://www.
CyberCop Monitor is the only commercial system-based IDS that has the ability to detect stealth port scanning from multiple IP addresses over many, many months, guarding against even the most resolute attacks.
This is one of the most popular port scanning tools in use today.
Additionally, CCM supports a unique, non-intrusive, lightweight port scanning mode specifically designed for highly sensitive devices such as SCADA systems.