Analyze Diet
Sensors (Basel, Switzerland)2020; 20(16); 4423; doi: 10.3390/s20164423

The Design of Large Scale IP Address and Port Scanning Tool.

Abstract: The control network is an important supporting environment for the control system of the heavy ion accelerator in Lanzhou (HIRFL). It is of great importance to maintain the accelerator system's network security for the stable operation of the accelerator. With the rapid expansion of the network scale and the increasing complexity of accelerator system equipment, the security situation of the control network is becoming increasingly severe. Port scanning detection can effectively reduce the losses caused by viruses and Trojan horses. This article uses Go Concurrency Patterns, combined with transmission control protocol (TCP) full connection scanning and GIMP Toolkit (GTK) graphic display technology, to develop a tool called HIRFL Scanner. It can scan IP addresses in any range with any ports. This is a very fast, installation-free, cross-platform IP address and port scanning tool. Finally, a series of experiments show that the tool developed in this paper is much faster than the same type of software, and meets the expected development needs.
Publication Date: 2020-08-08 PubMed ID: 32784387PubMed Central: PMC7472026DOI: 10.3390/s20164423Google Scholar: Lookup
The Equine Research Bank provides access to a large database of publicly available scientific literature. Inclusion in the Research Bank does not imply endorsement of study methods or findings by Mad Barn.
  • Letter

Summary

This research summary has been generated with artificial intelligence and may contain errors and omissions. Refer to the original study to confirm details provided. Submit correction.

This research article details the creation and testing of a new network security scanning tool named HIRFL Scanner. This tool, designed for large scale control networks, aims to minimize loss from viruses and trojans by identifying vulnerabilities via IP address and port scanning.

Importance of Network Security

  • The article starts by emphasizing the importance of network security, particularly in the complex environment of control systems for heavy ion accelerators.
  • It stresses that maintaining a secure network is paramount for ensuring the stable operation of such accelerators, especially as these systems continue to grow and become more complex.
  • Port scanning, which is a method to identify open doors or vulnerabilities in a network, is particularly noted as an effective measure in reducing potential damage from viruses and trojans.

Development of the HIRFL Scanner

  • The researchers use Go Concurrency Patterns in the development of this scanning tool. Go Concurrency, a feature of the Go programming language, is known for allowing multiple tasks to run at the same time, which may enhance the speed and efficiency of the tool.
  • A combination of TCP full connection scanning and GTK graphic display technology is used. TCP full connection scanning is a robust technique to check open ports, while GTK graphic display provides a visual interface, making the tool easier to manipulate and understand by the operators.
  • The result is the HIRFL Scanner, an installation-free, fast and cross-platform tool that can systematically scan any range of IP addresses and their respective ports.

Experimental Results

  • The article states that a series of tests done with the HIRFL Scanner demonstrated its superior speed compared to other software tools of the same type.
  • The tool met the expected development needs and provided a fast, efficient way of scanning IP addresses and ports in the control network for possible vulnerabilities.

Cite This Article

APA
Yuan C, Du J, Yue M, Ma T. (2020). The Design of Large Scale IP Address and Port Scanning Tool. Sensors (Basel), 20(16), 4423. https://doi.org/10.3390/s20164423

Publication

ISSN: 1424-8220
NlmUniqueID: 101204366
Country: Switzerland
Language: English
Volume: 20
Issue: 16
PII: 4423

Researcher Affiliations

Yuan, Chao
  • Institute of Modern Physics, Chinese Academy of Sciences, Lanzhou 730000, China.
Du, Jinze
  • School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730000, China.
Yue, Min
  • Institute of Modern Physics, Chinese Academy of Sciences, Lanzhou 730000, China.
Ma, Tao
  • Institute of Modern Physics, Chinese Academy of Sciences, Lanzhou 730000, China.

Conflict of Interest Statement

The authors declare no conflict of interest.

References

This article includes 34 references
  1. Galeano-Brajones J, Carmona-Murillo J, Valenzuela-Valdés JF, Luna-Valero F. Detection and Mitigation of DoS and DDoS Attacks in IoT-Based Stateful SDN : An Experimental Approach.. Sensors (Basel) 2020 Feb 3;20(3).
    doi: 10.3390/s20030816pmc: PMC7038683pubmed: 32028711google scholar: lookup
  2. Iyamuremye B, Shima H. Network Security Testing Tools for SMES (Small and Medium Enterprises). IEEE New York, NY, USA: 2018. pp. 414–417.
  3. Lai Y, Gao H, Liu J. Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer.. Sensors (Basel) 2020 Apr 5;20(7).
    doi: 10.3390/s20072040pmc: PMC7180888pubmed: 32260503google scholar: lookup
  4. Birkinshaw C, Rouka E, Vassilakis VG. Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks. J. Netw. Comput. Appl. 2019;136:71–85.
  5. Li Z, Yu X, Wang D, Liu Y, He S. Supereye: A distributed port scanning system. Proceedings of the International Conference on Artificial Intelligence and Security New York, NY, USA. 26–28 July 2019; pp. 45–56.
  6. Sanz IJ, Lopez MA, Mattos DMF, Duarte OCMB. A cooperation-aware virtual network function for proactive detection of distributed port scanning. Proceedings of the Cyber Security in Networking Conference Rio de Janeiro, Brazil. 18–20 October 2017.
  7. Dhivvya JP, Muralidharan D, Raj N, Kumar BK. Network simulation and vulnerability assessment tool for an enterprise network. Proceedings of the International Conference on Computing Communication and Networking Technologies Kanpur, India. 6–8 July 2019.
  8. Bowie WS, Linders JG. A software trace facility for os/mvt. Softw. Pract. Exp. 1979;9:535–545.
    doi: 10.1002/spe.4380090704google scholar: lookup
  9. Borgerson B, Godfrey M, Hagerty P, Rykken T. The architecture of sperry univac 1100 series systems. Proc. Annu. Symp. Comput. Archit. 1979:137–146.
  10. Arce IJNS. Vulnerability management at the crossroads. Netw. Secur. 2008;5:11–13.
  11. Millwater HR, Wu YT, Dias JB, Mcclung RC, Raveendra ST, Thacker BH. In The nessus software system for probabilistic structural analysis. Struct. Saf. Reliab. ASCE 1989;3:2283–2290.
  12. Shah M, Ahmed S, Saeed K, Junaid M, Khan H, Ata-ur-Rehman. Penetration testing active reconnaissance phase—optimized port scanning with nmap tool. Proceedings of the 2nd International Conference on Computing, Mathematics and Engineering Technologies Sukkur, Pakistan. 30–31 January 2019.
  13. De Vivo M, Carrasco E, Isern G, de Vivo GOJASC CR. A review of port scanning techniques. Comput. Commun. Rev. 1999;29:41–48.
    doi: 10.1145/505733.505737google scholar: lookup
  14. Rohrmann RR, Ercolani VJ, Patton MW. In Large scale port scanning through tor using parallel nmap scans to scan large portions of the ipv4 range. Proceedings of the IEEE International Conference on Intelligence & Security Informatics Beijing, China. 22–24 July 2017.
  15. Durumeric Z, Wustrow E, Halderman JA. Zmap: Fast internet-wide scanning and its security applications. Proceedings of the 22nd USENIX Security Symposium Washington, DC, USA. 14–16 August 2013.
  16. Mazel J, Strullu R. Identifying and characterizing zmap scans: A cryptanalytic approach. arXiv 20191908.04193.
  17. Lee S, Im SY, Shin SH, Roh BH, Lee C. Implementation and vulnerability test of stealth port scanning attacks using zmap of censys engine. Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC) Jeju, Korea. 19–21 October 2016.
  18. De Santis G, Lahmadi A, Francois J, Festor O. Modeling of ip scanning activities with hidden markov models: Darknet case study. Proceedings of the 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS) Larnaca, Cyprus. 21–23 November 2016.
  19. Dilley N, Lange J. An empirical study of messaging passing concurrency in go projects. Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER) Hangzhou, China. 24–27 February 2019.
  20. Fava DS, Steffen M. Ready, Set, Go! Data-Race Detection and the Go Language. Volume 195 Elsevier Amsterdam, The Netherlands: 2019.
  21. Emoto M, Shibata K, Watanabe K, Ohdachi S, Ida K, Sudo S. Development of a flexible visualization tool. Fusion Eng. Des. 2002;60:367–371.
  22. Garea AS, Heras DB, Argüello F. An open source desktop application for classification of remote sensing data. Proceedings of the IEEE International Conference on Intelligent Data Acquisition & Advanced Computing Systems: Technology & Applications Warsaw, Poland. 24–26 September 2015.
  23. Patel SK, Sonker A. In Internet protocol identification number based ideal stealth port scan detection using snort. Proceedings of the International Conference on Computational Intelligence and Communication Networks Tehri, India. 23–25 December 2016; pp. 422–427.
  24. Myers D, Foo E, Radke K. Internet-wide scanning taxonomy and framework, artificial intelligence and symbolic computation. Proceedings of the 13th Australasian Information Security Conference Sydney, Australia. 27–30 January 2015; pp. 61–65.
  25. Bhuyan MH, Bhattacharyya DK, Kalita JK. Surveying port scans and their detection methodologies. Comput. J. 2011;54:1565–1581.
    doi: 10.1093/comjnl/bxr035google scholar: lookup
  26. Bou-Harb E, Debbabi M, Assi C. On fingerprinting probing activities. Comput. Secur. 2014;43:35–48.
  27. Durumeric Z, Bailey M, Halderman JA, Assoc U. An internet-wide view of internet-wide scanning. Proceedings of the 23rd USENIX Security Symposium San Diego, CA, USA. 20–22 August 2014; pp. 65–78.
  28. Sivanathan A, Gharakheili HH, Sivaraman V. Can we classify an iot device using tcp port scan?. Proceedings of the IEEE International Conference on Information and Automation for Sustainability (ICIAFS) Sri Lanka, India. 21–22 December 2018.
  29. Kumar S, Dutta K, Asati A. Two Pass Port Scan Detection Technique Based on Connection Pattern and Status on Sampled Data. J. Comput. Commun. 2015;3:1–8.
    doi: 10.4236/jcc.2015.39001google scholar: lookup
  30. Jajal B, Iyer S, Chauhan D. Mitigating illicit entry using website port scanning tools in indian context. Proceedings of the International Conference on Computing for Sustainable Global Development New Delhi, India. 13–15 March 2019.
  31. Gupta S. Port. Scanning: Uncover key Concepts of Website and Network Security. Springer Berlin, Germany: 2019.
  32. Ensafi R, Park JC, Kapur D, Crandall JR. Idle port scanning and non-interference analysis of network protocol stacks using model checking. Proceedings of the Usenix Security Symposium Washington, DC, USA. 11–13 August 2010.
  33. Bodenheim R, Butts J, Dunlap S, Mullins B. Evaluation of the ability of the shodan search engine to identify internet-facing industrial control devices. Int. J. Crit. Infrastruct. Prot. 2014;7:114–123.
  34. Fernández-Caramés TM, Fraga-Lamas P. Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.. Sensors (Basel) 2020 May 27;20(11).
    doi: 10.3390/s20113048pmc: PMC7309102pubmed: 32471252google scholar: lookup

Citations

This article has been cited 0 times.