1 |
Shodan, http://www.shodanhq.com/
|
2 |
Censys, https://www.censys.io
|
3 |
NMAP, https://nmap.org/
|
4 |
Z. Durumeric, D. Adrian, A. Mirian, M. Bailey, and J. A. Halderman, "A search engine backed by Internet-wide scanning," in Proc. ACM SIGSAG 2015, pp. 542-553, Denver, USA, Oct. 2015.
|
5 |
G. S. Rao, P. N. Kumar, P. Swetha, and G. BhanuKiran, "Security assessment of computer networks -an ethical hacker's perspective," in Proc. IEEE ICCCT 2014, Allahabad, India, Dec. 2014.
|
6 |
Y. Jung and M. Park, "Network defense mechanism based on Isolated Networks," J. KICS, vol. 41, no. 9, pp. 1103-1107, Sept. 2016.
DOI
|
7 |
J. Jo, H. Jang, K. Lee, and J. Kong, "SDN-based intrusion prevention system for science DNZ," J. KICS, vol. 40, no. 6, pp. 1070-1080, Jun. 2015.
DOI
|
8 |
H. Lim, W. Kim, H. Noh, and J. Lim, "Research on malware classification with network activity for classification and attack prediction of attack group," J. KICS, vol. 42, no. 1, pp. 193-204, Jan. 2017
DOI
|
9 |
S. Kumar and S. D. Sudarsan, "An innovative UDP port scanning technique," Int. J. Future Computer and Commun.. vol. 3, no. 6, Dec. 2014.
|
10 |
X. Zhang, J. Knockel, and J. R. Crandall, "Original SYN: Finding machines hidden behind firewalls," in Proc. IEEE INFOCOM 2015, Hong Kong, China, May 2015.
|
11 |
L. Markowsky and G. Markowsky, "Scanning for vulnerable devices in the internet of things," in Proc. IEEE IDAACS 2015, vol. 1, pp. 463-467, Warsaw, Poland, Sept. 2015.
|
12 |
V. Kathayat and L. Ahuja, "Network security with open source firewall," Int. Res. J. Comput. and Electron. Eng., vol. 1, no. 1, May 2013.
|
13 |
S. Shin and G. Gu, "Attacking software-defined networks: A first feasibility study," in Proc. ACM HotSDN 2013, pp. 165-166, Hong Kong, China, Aug. 2013.
|
14 |
H. Mohammadzadeh, M. Mansoori, and I. Welch, "Evaluation of fingerprinting techniques and a windows-based dynamic honeypot," in Proc. Australasian Info. Sec. Conf., vol. 138, Adelaide, Australia, Jan. 2013.
|
15 |
S. Scott-Hayward, G. O'Callaghan, and S. Sezer, "SDN security: A survey," in Proc. IEEE SDN4FNS 2013, pp. 1-7, Trento, Italy, Nov. 2013.
|
16 |
I. Ahmad, S. Namal, M. Ylianttila, and A. Gurtov, "Security in software defined networks: A survey," J. IEEE Commun. Surveys & Tuts., vol. 17, no. 4, pp. 2317-2346, 2015.
DOI
|