Scan Modeling and Performance Analysis for Extensive Terminal Information Identification 


Vol. 42,  No. 4, pp. 785-790, Apr.  2017


PDF
  Abstract

Network scanning tools typically use port scans to steal information from network terminals and identify vulnerabilities. In particular, Shodan and Censys use a network scanning tool to gather a wide range of terminal information, store it in their database and provide it to the users. In order to prevent such information gathering, it is required to know the scanning methods of Shodan and Censys. However, the scanning model used by Shodan and Censys is not known exactly. Therefore, this paper estimates scanning models of Shodan and Censys and analyzes the performance of each models.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

S. Im, S. Shin, B. Roh, J. Lee, "Scan Modeling and Performance Analysis for Extensive Terminal Information Identification," The Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 4, pp. 785-790, 2017. DOI: .

[ACM Style]

Sun-young Im, Seung-hun Shin, Byeong-hee Roh, and Jung-tae Lee. 2017. Scan Modeling and Performance Analysis for Extensive Terminal Information Identification. The Journal of Korean Institute of Communications and Information Sciences, 42, 4, (2017), 785-790. DOI: .

[KICS Style]

Sun-young Im, Seung-hun Shin, Byeong-hee Roh, Jung-tae Lee, "Scan Modeling and Performance Analysis for Extensive Terminal Information Identification," The Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 4, pp. 785-790, 4. 2017.