Anonymous port scanning: Performing network reconnaissance through Tor

Rodney Rohrmann, Mark W. Patton, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

The anonymizing network Tor is examined as one method of anonymizing port scanning tools and avoiding identification and retaliation. Performing anonymized port scans through Tor is possible using Nmap, but parallelization of the scanning processes is required to accelerate the scan rate.

Original languageEnglish (US)
Title of host publicationIEEE International Conference on Intelligence and Security Informatics
Subtitle of host publicationCybersecurity and Big Data, ISI 2016
EditorsWenji Mao, G. Alan Wang, Lina Zhou, Lisa Kaati
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages217
Number of pages1
ISBN (Electronic)9781509038657
DOIs
StatePublished - Nov 15 2016
Event14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 - Tucson, United States
Duration: Sep 28 2016Sep 30 2016

Publication series

NameIEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016

Other

Other14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015
Country/TerritoryUnited States
CityTucson
Period9/28/169/30/16

Keywords

  • Anonymization
  • Scanning
  • Tor

ASJC Scopus subject areas

  • Information Systems
  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Anonymous port scanning: Performing network reconnaissance through Tor'. Together they form a unique fingerprint.

Cite this