Abstract
With the rapid development of the Internet, more and more services are emerging on the Internet, but it also brings a lot of security risks. Scanning the services on the network by sending probe packets, user can know which host opens a specific service, and can also know statistical data related, which is very important for the network maintenance and discovering dangerous services. This paper focuses on SuperEye, a large-scale and interactive distributed port scanning system. In order to realize interactive port scanning, an enhanced version of TCP state transition automaton is defined to describe the interactive process of contracting and receiving packets. In order to improve the scanning efficiency and avoid triggering IDS, discusses the distribution of tasks, and the tasks are distributed with redundancy and then intermediate states of the task displayed in time, then process and store the returning results for analysis and statistics and at last show the visual results to users. The system interacts with users by friendly web pages. And heartbeat detection is also implemented to ensure the reliability of scanning tasks. Finally, a series of unit tests and integration tests are carried out, and it’s sure that the completed system meets the expected development requirements.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Zhang, T., Hu, M., Yun, X., Zhang, Y.: Research and implementation of active detection technology for network information. Comput. Eng. Appl. (31), 17–20+43 (2004)
Du, Q., Kishi, K., Aiura, N., et al.: Transportation network vulnerability: vulnerability scanning methodology applied to multiple logistics transport networks. Transp. Res. Rec. J. Transp. Res. Board 2410(2410), 96–104 (2014)
Du, Y.: Research on network service detection technology. J. Chin. People’s Public Secur. Univ. (Nat. Sci. Edn.) 01, 69–72 (2007)
Bou-Harb, E., Debbabi, M., Assi, C.: Cyber scanning: a comprehensive survey. IEEE Commun. Surv. Tutorials 16(3), 1496–1519 (2014)
Anbar, M., Manasrah, A., Ramadass, S., Altaher, A., Aljmmal, A., Almomani, A.: Investigating study on network scanning techniques. Int. J. Digit. Content Technol. Appl. 9, 312–320 (2013)
Modi, C., Patel, D., Borisaniya, B., et al.: Review: a survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)
Ran, S.: Research of Vulnerability Scanning Technology Based on Masscan. Nankai University, Nankai District (2016)
Anderson, H.: Introduction to nessus (2003)
Lyon, G.F.: Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. Insecure, USA (2009)
Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: Proceedings of Usenix Security Symposium, pp. 605–620 (2013)
Graham, R.D.: MASSCAN: Mass IP port scanner. https://github.com/robertdavidgraham/masscan. Accessed 03 July 2018
Garcia-Alfaro, J., Cuppens-Boulahia, N., Martinez, S., et al.: Management of stateful firewall misconfiguration. Comput. Secur. 39(39), 64–85 (2013)
Skvorc, D., Horvat, M., Srbljic, S.: Performance evaluation of Websocket protocol for implementation of full-duplex web streams. In: International Convention on Information and Communication Technology, Electronics and Microelectronics, pp. 1003–1008. IEEE (2014)
Paalasmaa, J., Toivonen, H., Partinen, M.: Adaptive heartbeat modeling for beat-to-beat heart rate measurement in ballistocardiograms. IEEE J. Biomed. Health Inform. 19(6), 1945 (2015)
Wang, S.: Design and Implementation of Communication and Heartbeat Module of Distributed Cluster Management System. Nanjing University (2014)
Wu, X., Zhang, C., Zhang, R., Wang, Y., Cui, J.: A distributed intrusion detection model via nondestructive partitioning and balanced allocation for big data. CMC: Comput. Mater. Continua 56(1), 61–72 (2018)
Xie, X., Yuan, T., Zhou, X., Cheng, X.: Research on trust model in container-based cloud service. CMC: Comput. Mater. Continua 56(2), 273–283 (2018)
Acknowledgement
This work was supported by National Key Research & Development Plan of China under Grant 2016QY05X1000, National Natural Science Foundation of China under Grant No. 61571144 and 61771166, and Dongguan Innovative Research Team Program under Grant No. 201636000100038.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Li, Z., Yu, X., Wang, D., Liu, Y., Yin, H., He, S. (2019). SuperEye: A Distributed Port Scanning System. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11635. Springer, Cham. https://doi.org/10.1007/978-3-030-24268-8_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-24268-8_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24267-1
Online ISBN: 978-3-030-24268-8
eBook Packages: Computer ScienceComputer Science (R0)