Abstract
This paper discusses the functionality of port scanning techniques used for accessing the IP addresses of vulnerable hosts present in the network. These techniques usually perform for network monitoring and troubleshooting purposes. On the other hand, the attackers use this utility to find the vulnerabilities in the network, gain unauthorized access, and penetrate the network system. The primary step taken by the attacker to bombard a targeted cyber-attack is the port scanning technique. Nowadays, port scanning becomes highly dispersed, sophisticated, compound, and stealthy, hence the detection techniques are unachievable. We also discuss the working mechanism of snort intrusion detection system (IDS) tool used for intrusion detection, architecture, its installation, the configuration of files, and detection techniques. In our experiment, we have installed, configured snort IDS with rule files in one machine and the traffic monitored for other machines connected in the network. This research work demonstrates the implementation of denial of service attack (DoS) variants in the real-time network traffic and ramifications of the attacks using snort IDS tool.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have