Skip to main content

SuperEye: A Distributed Port Scanning System

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11635))

Abstract

With the rapid development of the Internet, more and more services are emerging on the Internet, but it also brings a lot of security risks. Scanning the services on the network by sending probe packets, user can know which host opens a specific service, and can also know statistical data related, which is very important for the network maintenance and discovering dangerous services. This paper focuses on SuperEye, a large-scale and interactive distributed port scanning system. In order to realize interactive port scanning, an enhanced version of TCP state transition automaton is defined to describe the interactive process of contracting and receiving packets. In order to improve the scanning efficiency and avoid triggering IDS, discusses the distribution of tasks, and the tasks are distributed with redundancy and then intermediate states of the task displayed in time, then process and store the returning results for analysis and statistics and at last show the visual results to users. The system interacts with users by friendly web pages. And heartbeat detection is also implemented to ensure the reliability of scanning tasks. Finally, a series of unit tests and integration tests are carried out, and it’s sure that the completed system meets the expected development requirements.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Zhang, T., Hu, M., Yun, X., Zhang, Y.: Research and implementation of active detection technology for network information. Comput. Eng. Appl. (31), 17–20+43 (2004)

    Google Scholar 

  2. Du, Q., Kishi, K., Aiura, N., et al.: Transportation network vulnerability: vulnerability scanning methodology applied to multiple logistics transport networks. Transp. Res. Rec. J. Transp. Res. Board 2410(2410), 96–104 (2014)

    Article  Google Scholar 

  3. Du, Y.: Research on network service detection technology. J. Chin. People’s Public Secur. Univ. (Nat. Sci. Edn.) 01, 69–72 (2007)

    Google Scholar 

  4. Bou-Harb, E., Debbabi, M., Assi, C.: Cyber scanning: a comprehensive survey. IEEE Commun. Surv. Tutorials 16(3), 1496–1519 (2014)

    Article  Google Scholar 

  5. Anbar, M., Manasrah, A., Ramadass, S., Altaher, A., Aljmmal, A., Almomani, A.: Investigating study on network scanning techniques. Int. J. Digit. Content Technol. Appl. 9, 312–320 (2013)

    Google Scholar 

  6. Modi, C., Patel, D., Borisaniya, B., et al.: Review: a survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)

    Article  Google Scholar 

  7. Ran, S.: Research of Vulnerability Scanning Technology Based on Masscan. Nankai University, Nankai District (2016)

    Google Scholar 

  8. Anderson, H.: Introduction to nessus (2003)

    Google Scholar 

  9. Lyon, G.F.: Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. Insecure, USA (2009)

    Google Scholar 

  10. Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: Proceedings of Usenix Security Symposium, pp. 605–620 (2013)

    Google Scholar 

  11. Graham, R.D.: MASSCAN: Mass IP port scanner. https://github.com/robertdavidgraham/masscan. Accessed 03 July 2018

  12. Garcia-Alfaro, J., Cuppens-Boulahia, N., Martinez, S., et al.: Management of stateful firewall misconfiguration. Comput. Secur. 39(39), 64–85 (2013)

    Article  Google Scholar 

  13. Skvorc, D., Horvat, M., Srbljic, S.: Performance evaluation of Websocket protocol for implementation of full-duplex web streams. In: International Convention on Information and Communication Technology, Electronics and Microelectronics, pp. 1003–1008. IEEE (2014)

    Google Scholar 

  14. Paalasmaa, J., Toivonen, H., Partinen, M.: Adaptive heartbeat modeling for beat-to-beat heart rate measurement in ballistocardiograms. IEEE J. Biomed. Health Inform. 19(6), 1945 (2015)

    Article  Google Scholar 

  15. Wang, S.: Design and Implementation of Communication and Heartbeat Module of Distributed Cluster Management System. Nanjing University (2014)

    Google Scholar 

  16. Wu, X., Zhang, C., Zhang, R., Wang, Y., Cui, J.: A distributed intrusion detection model via nondestructive partitioning and balanced allocation for big data. CMC: Comput. Mater. Continua 56(1), 61–72 (2018)

    Google Scholar 

  17. Xie, X., Yuan, T., Zhou, X., Cheng, X.: Research on trust model in container-based cloud service. CMC: Comput. Mater. Continua 56(2), 273–283 (2018)

    Google Scholar 

Download references

Acknowledgement

This work was supported by National Key Research & Development Plan of China under Grant 2016QY05X1000, National Natural Science Foundation of China under Grant No. 61571144 and 61771166, and Dongguan Innovative Research Team Program under Grant No. 201636000100038.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zibo Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Z., Yu, X., Wang, D., Liu, Y., Yin, H., He, S. (2019). SuperEye: A Distributed Port Scanning System. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11635. Springer, Cham. https://doi.org/10.1007/978-3-030-24268-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24268-8_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24267-1

  • Online ISBN: 978-3-030-24268-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics