Ping Sweeps and Port Scans

Satisfactory Essays
SEC280
March 10,2011

Ping Sweeps and Port Scans:
Should we worry?

Ping Sweeps and Port Scans are the two most common network probes that serve as important clues in sensing invasion or intrusion that can harm a network. Network probes are not actual intrusions, although, they could be potential causes of actual intrusions. Port scans and ping sweeps can lead to an intrusion of companies network system, however, with today’s technological advancements, these activities can be detected and prevented.
Ping Sweeps; Ping sweeps are a set of ICMP Echo packets that are sent out to network of computers, actually a range of IP addresses, to see if there are any responses. As an intruder sends out the ping sweeps, he looks for responses so he can figure out which machines he can attack. “Note that there are legitimate reasons for performing ping sweeps on a network—a network administrator may be trying to find out which machines are alive on a network for diagnostic reasons. Ping sweeps are detectable using special tools as well. ippl is an IP protocol logger that can log TCP, UDP and ICMP packets. It is similar to scanlogd, where it sits in the background and listens for packets. Be careful when using ippl though—if you 're on a busy Ethernet network, you might find that your ippl log files (usually at /var/log/ippl/*) may fill up rather quickly (Teo, 2000).”
Port Scans; Even though ping sweeps are common, port scans are probably the most common probes and relatively simple to perform. A very simple port scan can be programmed in a few minutes. However, this method can easily be detected and therefore is not used much. “Another sneakier, “stealthier” kind of port scan is called the “half-open” SYN scan. In this scan, the port scanner connects to the port but shuts down the connection right before a full connection occurs (hence the name “half-open”). Since a full connection never happened, the operating system of the target machine usually



References: Teo, L. (2000). Network Probes Explained: Understanding Port Scans and Ping Sweeps. Retrieved on March 10,2011 from: http://www.linuxjournal.com/article/4234?page=0,1

You May Also Find These Documents Helpful

  • Good Essays

    Ping Sweeps and Port Scans January 11, 2013 Freddie Jackson DeVry University This report is to provide insight on nefarious computer activities called ping sweeps and port scans as a request from management. I will identify them, explain what they are use for, how they are used and how to stop them from attacking a network. Finally I will discuss how they can be eliminated as security risk. The information in this report is designed to increase the understanding and knowledge of these two…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ping sweeps and Port scans are a great security tool for businesses. Ping sweeps are used to find someone on the end of a network and Port scans are then used to find a way into that end of the network. Once a perpetrator gets in there is no telling what harm could be done. These techniques can also be used for troubleshooting issues that can arise inside the company. It is in the company’s best interest to be aware of ping sweeps and port scans to help from devastating consequences later on. A…

    • 434 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ping Sweeps and Port Scans Recently, it was brought to my attention that there are concerns about some activities on the network that can be considered less than trustworthy. Specifically, the concerns are regarding network traffic called ping sweeps and port scans. I’m putting together this paper to explain how ping sweeps and port scans impact our network traffic. First we must understand what these two things do before we can understand how they are used to impact a network. I’ll start…

    • 690 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Threat Assessment of Ping Sweeps and Port Scans Ping sweeps and port scans are two techniques that a malicious computer user such as a hacker can utilize to compromise an Enterprise networks security and gain access to their proprietary data. For example, private email messages can be forwarded to a rogue destination email address: Done by installing a virus program into a user’s email client through a discovered active computers open TCP/IP IMAP port (port number 143) that is not being currently…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ping screening is a device used by people who want to get access to a computer either legally or illegally. Hackers that are trying to gain access to any computers within a company or home will use a Ping sweep to see if any computers are on. Network Administrators and also use a Ping sweep to see which computers are on as well, but for fixing or making adjustments as needed within their network. IP companies also send a Ping sweep which helps them determine if there is a problem between their…

    • 532 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ping Sweeps and Port Scans The use of computers in this generation has been a necessity. A lot of companies depend on computers to operate their business which is why it is essential to learn the different threats that other people could use to attack their business. New technologies are on the rise these days and the knowledge that people have about computers can be accessed easily on the internet. Different kind of hackers can get access to people’s computers easily with the necessary knowledge…

    • 602 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    source of information (internet protocol (IP) address ranges, domain name system (DNS) servers, mail servers); * Scanning: this phase involves determining which hosts in the targeted network are alive and reachable (through ping sweeps), which services they offer (through port scanning) and which operating systems they run (operating system (OS) fingerprinting); * Enumeration: this phase involves extracting valid accounts or exported resources, system banners, routing tables, simple network management…

    • 9158 Words
    • 37 Pages
    Powerful Essays
  • Good Essays

    Ping Sweeps

    • 685 Words
    • 3 Pages

    Ping sweeps and ports scans are a common ways for hackers to attempt to break a network. As a system administrator this is a concern and for the boss this should not be a worry for him. The system administrator has a lot of steps to stop attempts from hackers to get any information by using the ping sweeps and ports scans. Once, the hackers are discourage they should move on to another site. A ping sweep is a basic networking scanning technique used to determine which range of IP addresses…

    • 685 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ping Pong

    • 544 Words
    • 3 Pages

    given that high-profile American citizens such as Senator Eugene McCarthy expressed interest in visiting China after the 1968 presidential election, but even he could not have a trip arranged for him despite his office. Ping-pong diplomacy refers to the exchange of table tennis (ping-pong) players between the United States and People's Republic of China (PRC) in the early 1970s. The event marked a thaw in U.S.–China relations that paved the way to a visit to Beijing by President Richard Nixon. How…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Chimney Sweep

    • 575 Words
    • 3 Pages

    early 1800’s. Children around the age of seven, but could be as young as the age of five, were expected to sweep chimneys. Those children were put into horrible conditions mainly due to the fact that they were orphans. Those who were forced to do these jobs were paid as little as twenty shillings, and if the child was not an orphan the money went directly to his family. The child normally was a sweep for around seven years due to the fact that he or she became too big to fit up inside the chimney. The…

    • 575 Words
    • 3 Pages
    Good Essays