Visible to the public Cyber Scanning: A Comprehensive Survey

TitleCyber Scanning: A Comprehensive Survey
Publication TypeJournal Article
Year of Publication2014
AuthorsBou-Harb, E., Debbabi, M., Assi, C.
JournalCommunications Surveys Tutorials, IEEE
Date PublishedThird
KeywordsCyber scanning, cyber scanning technique, Cyberspace, distributed cyber scanning detection method, enterprise networks, Internet, Internet wide services, Monitoring, Network reconnaissance, Ports (Computers), Probes, Probing, Probing campaigns, Protocols, Scanning events, security of data, Servers, targeted cyber attack

Cyber scanning refers to the task of probing enterprise networks or Internet wide services, searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the primarily methodology that is adopted by attackers prior to launching a targeted cyber attack. Hence, it is of paramount importance to research and adopt methods for the detection and attribution of cyber scanning. Nevertheless, with the surge of complex offered services from one side and the proliferation of hackers' refined, advanced, and sophisticated techniques from the other side, the task of containing cyber scanning poses serious issues and challenges. Furthermore recently, there has been a flourishing of a cyber phenomenon dubbed as cyber scanning campaigns - scanning techniques that are highly distributed, possess composite stealth capabilities and high coordination - rendering almost all current detection techniques unfeasible. This paper presents a comprehensive survey of the entire cyber scanning topic. It categorizes cyber scanning by elaborating on its nature, strategies and approaches. It also provides the reader with a classification and an exhaustive review of its techniques. Moreover, it offers a taxonomy of the current literature by focusing on distributed cyber scanning detection methods. To tackle cyber scanning campaigns, this paper uniquely reports on the analysis of two recent cyber scanning incidents. Finally, several concluding remarks are discussed.

Citation Key6657498