Port Scanning Techniques and Analysis of Attack and Defense

Zhaohui Hu,Qi Chen,Ruizhao Yu
DOI: https://doi.org/10.3321/j.issn:1002-8331.2001.10.020
2001-01-01
Abstract:This article introduces the implementation of TCP Protocol and the technique of Port Scanning based on the characteristic of TCP Protocol,at the same time,the several implementations of Port Scanning are also described. We also analyze the potential external attacks that can be made because of the weakness of operation system and the ways to avoid suck kinds of attack are also put up.
What problem does this paper attempt to address?