{"title":"自我端口扫描工具:通过使用主动端口扫描提供更安全的计算环境","authors":"Joshua E. Kocher, D. Gilliam","doi":"10.1109/WETICE.2005.51","DOIUrl":null,"url":null,"abstract":"Secure computing is a necessity in the hostile environment that the Internet has become. Protection from nefarious individuals and organizations requires a solution that is more a methodology than a one time fix. One aspect of this methodology is having the knowledge of which network ports a computer has open to the world. These network ports are essentially the doorways from the Internet into the computer. An assessment method which uses the nmap software to scan ports has been developed to aid system administrators (SAs) with analysis of open ports on their system(s). Additionally, baselines for several operating systems have been developed so that SAs can compare their open ports to a baseline for a given operating system. Further, the tool is deployed on a Web site where SAs and users can request a port scan of their computer. The results are then emailed to the requester. This tool aids users, SAs, and security professionals by providing an overall picture of what services are running, what ports are open, potential trojan programs or back doors, and what ports can be closed.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Self port scanning tool: providing a more secure computing environment through the use of proactive port scanning\",\"authors\":\"Joshua E. Kocher, D. Gilliam\",\"doi\":\"10.1109/WETICE.2005.51\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Secure computing is a necessity in the hostile environment that the Internet has become. Protection from nefarious individuals and organizations requires a solution that is more a methodology than a one time fix. One aspect of this methodology is having the knowledge of which network ports a computer has open to the world. These network ports are essentially the doorways from the Internet into the computer. An assessment method which uses the nmap software to scan ports has been developed to aid system administrators (SAs) with analysis of open ports on their system(s). Additionally, baselines for several operating systems have been developed so that SAs can compare their open ports to a baseline for a given operating system. Further, the tool is deployed on a Web site where SAs and users can request a port scan of their computer. The results are then emailed to the requester. This tool aids users, SAs, and security professionals by providing an overall picture of what services are running, what ports are open, potential trojan programs or back doors, and what ports can be closed.\",\"PeriodicalId\":128074,\"journal\":{\"name\":\"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)\",\"volume\":\"2015 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-06-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WETICE.2005.51\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WETICE.2005.51","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Self port scanning tool: providing a more secure computing environment through the use of proactive port scanning
Secure computing is a necessity in the hostile environment that the Internet has become. Protection from nefarious individuals and organizations requires a solution that is more a methodology than a one time fix. One aspect of this methodology is having the knowledge of which network ports a computer has open to the world. These network ports are essentially the doorways from the Internet into the computer. An assessment method which uses the nmap software to scan ports has been developed to aid system administrators (SAs) with analysis of open ports on their system(s). Additionally, baselines for several operating systems have been developed so that SAs can compare their open ports to a baseline for a given operating system. Further, the tool is deployed on a Web site where SAs and users can request a port scan of their computer. The results are then emailed to the requester. This tool aids users, SAs, and security professionals by providing an overall picture of what services are running, what ports are open, potential trojan programs or back doors, and what ports can be closed.