Port scanning is the process of attempting to connect to various network ports on a computing endpoint to determine which ports are open and which services are running on them. It is a common method used by hackers to identify vulnerabilities in a network or system. By determining which ports are open, an attacker can identify which services and applications are running on a device and potentially exploit any known vulnerabilities in those services. Consequently, it is important to detect port scanning because it is often the first step in a cyber attack. By identifying port scanning attempts, cybersecurity professionals can take proactive measures to protect the systems and networks before an attacker has a chance to exploit any vulnerabilities. Against this background, researchers have worked for over a decade to develop robust methods to detect port scanning. While there have been various surveys, none have focused solely on machine learning based detection schemes specific to port scans. Accordingly, we provide a systematic review of 15 papers published between February 2021 and January 2023. We extract critical information such as training dataset, algorithm used, technique, and model accuracy. We also collect unresolved challenges and ideas for future work. The outcomes are significant for researchers looking to step off from the latest work and for practitioners interested in novel mechanisms to detect the early stages of cyber attack.
翻译:港口扫描是试图在计算端点上与各个网络港口连接,以确定哪些港口是开放的,哪些服务是运行在港口上的,这是黑客用来查明网络或系统中弱点的常用方法。通过确定哪些港口是开放的,攻击者可以确定哪些服务和应用在设备上运行,并有可能利用这些服务中的任何已知弱点。因此,必须检测港口扫描,因为这是网络袭击的第一步。通过查明港口扫描尝试,网络安全专业人员可以在攻击者有机会利用任何弱点之前采取预防性措施保护系统和网络。在这一背景下,研究人员已经工作了十多年,以制定健全的方法来检测港口扫描。虽然进行了各种调查,但没有一个攻击者能够仅仅侧重于根据港口扫描的具体发现办法进行机器学习。因此,我们系统地审查了2021年2月至2023年1月出版的15份文件。我们提取了培训数据集、使用算法、技术和模型准确性等关键信息。我们还收集了未来工作尚未解决的挑战和想法。结果对研究人员来说很重要,因为研究人员希望从最新工作中退出,并且有兴趣的网络袭击的从业人员在新阶段进行早期探测。