Anonymous port scanning: Performing network reconnaissance through Tor
Title | Anonymous port scanning: Performing network reconnaissance through Tor |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Rohrmann, R., Patton, M. W., Chen, H. |
Conference Name | 2016 IEEE Conference on Intelligence and Security Informatics (ISI) |
ISBN Number | 978-1-5090-3865-7 |
Keywords | Acceleration, anonymization, anonymizing port scanning tools, anonymous port scanning, computer communications software, Internet, IP networks, Linux, Management information systems, Network interfaces, Network reconnaissance, Nmap, Ports (Computers), pubcrawl, Reconnaissance, Resiliency, scan rate, scanning, scanning processes, Tor |
Abstract | The anonymizing network Tor is examined as one method of anonymizing port scanning tools and avoiding identification and retaliation. Performing anonymized port scans through Tor is possible using Nmap, but parallelization of the scanning processes is required to accelerate the scan rate. |
URL | http://ieeexplore.ieee.org/document/7745475/ |
DOI | 10.1109/ISI.2016.7745475 |
Citation Key | rohrmann_anonymous_2016 |
- Network reconnaissance
- Tor
- scanning processes
- scanning
- scan rate
- Resiliency
- Reconnaissance
- pubcrawl
- Ports (Computers)
- Nmap
- Acceleration
- Network interfaces
- Management information systems
- Linux
- IP networks
- internet
- computer communications software
- anonymous port scanning
- anonymizing port scanning tools
- anonymization