CFP last date
20 May 2024
Reseach Article

Cyber Reconnaissance: An Alarm before Cyber Attack

by H. P. Sanghvi, M. S. Dahiya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 6
Year of Publication: 2013
Authors: H. P. Sanghvi, M. S. Dahiya
10.5120/10472-5202

H. P. Sanghvi, M. S. Dahiya . Cyber Reconnaissance: An Alarm before Cyber Attack. International Journal of Computer Applications. 63, 6 ( February 2013), 36-38. DOI=10.5120/10472-5202

@article{ 10.5120/10472-5202,
author = { H. P. Sanghvi, M. S. Dahiya },
title = { Cyber Reconnaissance: An Alarm before Cyber Attack },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 6 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 36-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number6/10472-5202/ },
doi = { 10.5120/10472-5202 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:13:28.041943+05:30
%A H. P. Sanghvi
%A M. S. Dahiya
%T Cyber Reconnaissance: An Alarm before Cyber Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 6
%P 36-38
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today's cyber world is more than the internet. It is interdependent networks containing telecommunication network, embedded system and critical infrastructures. Malicious attacks on critical infrastructure become a major threat to business and government operations. An easy and fast access to network makes business successful and makes sensitive information more vulnerable to cyber thieves. Today's attacker and hacker is skillful and well equipped with various hacking tools can easily exploit a small vulnerability. Reconnaissance is a first phase of cyber-attack and we will study this phase show effective countermeasures. This paper is about the Cyber Reconnaissance and focused on Port Scanning and OS Fingerprinting attack and proposed some easy to use solutions.

References
  1. Collin Engelbert Peter van Loon, 2012, Offensive Cyber, Royal Netherlands Army.
  2. Leyla Bilge & Tudor Dumitras, 2012, Before We Knew It An Empirical Study of Zero-Day Attacks In The Real World, ACM Conference on Computer and Communications Security.
  3. Dell SonicWALL, 2012, Anatomy of Cyber Attack
  4. Homeland Security, 2009, A Roadmap for Cyber security Research.
  5. Don Davidson, 21-01-2013, Thwarting Stealthy Attacks with Anti-Reconnaissance, http://www. port80software. com/support/articles/antireconnaissance_security. asp
  6. U. S. Naval Academy, 21-01-2013, SI110: Phases of a Cyber-attack/Cyber-recon, http://www. usna. edu/cs/si110arch/si110AY12F/lec/l32/lec. html
  7. SANS Institute 2003, Network Reconnaissance – Detection and Prevention
Index Terms

Computer Science
Information Sciences

Keywords

Cyber Attack Information Assurance Information Security Cyber Reconnaissance