Scan Correlation -- Revealing distributed scan campaigns

Steffen Haas,Florian Wilkens,Mathias Fischer
DOI: https://doi.org/10.1109/NOMS47738.2020.9110470
2020-03-11
Abstract:Public networks are exposed to port scans from the Internet. Attackers search for vulnerable services they can exploit. In large scan campaigns, attackers often utilize different machines to perform distributed scans, which impedes their detection and might also camouflage the actual goal of the scanning campaign. In this paper, we present a correlation algorithm to detect scans, identify potential relations among them, and reassemble them to larger campaigns. We evaluate our approach on real-world Internet traffic and our results indicate that it can summarize and characterize standalone and distributed scan campaigns based on their tools and intention.
Cryptography and Security
What problem does this paper attempt to address?