Network Security Ping Sweeps Port Scans Case Study

Total Length: 694 words ( 2 double-spaced pages)

Total Sources: 1+

Page 1 of 2

Networks are continually vulnerable to threats, which is why it is important to understand the ramifications of ping sweeps and port scans. While ping sweeps and port scans are not attacks in and of themselves, they are probing activities. Ping sweeps are automated processes that show the malicious user which computers on a network are active, whereas port scans identify the potential points of entry into a network from which to launch an attack. Both ping sweeps and port scans are threats that can be averted in order to protect network security.

Ping sweeps are akin to shouting aloud in a canyon and waiting for a response, or sending a call on a radio. Usually, intruders can create robots to conduct ping sweeps for them. One protocol used is the ICMP ECHO (Teo, 2000). The ICMP ECHO sends messages within a range of IP addresses. Another type of ping sweep is the fp tool, which works more in a "round robin" fashion by sending a ping individually to each address (Teo, 2000). Computers that are online will, if they are unprotected, answer the call. Those computers that respond are vulnerable to attack, as the intruder has narrowed down which systems are available and online to probe further.

Stuck Writing Your "Network Security Ping Sweeps Port Scans" Case Study?

Of course, it is easy to see how ping sweeps have become a necessary part of network diagnostics. Therefore, ping sweeps are not all bad, but they can be used in malicious ways.

Port scans are mechanisms that detect open ports on the network, which can allow malicious users direct entry into the system. The process is much like a thief watching a house to scan for open windows or doors ("Ping Sweeps and Port Scans," 2014). In order to communicate on a network, sending data back and forth through protocols and systems like email, ports need to be opened and closed periodically. Port scanners capitalize on these normal behaviors by recognizing which ports are being used for two-way communication and identifying the protocols being used to access those ports. Continuing with the analogy, it is as if the thief is determining how high up the window is and what tools are needed to enter the house. Port scans are "the most common type of network probe" and are "actually very simple to perform," (Teo, 2000). Once the malicious user determines which ports are open, a series of further tests can be used….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Network Security Ping Sweeps Port Scans" (2015, July 15) Retrieved May 21, 2025, from
https://www.aceyourpaper.com/essays/network-security-ping-sweeps-port-scans-2152249

Latest MLA Format (8th edition)

Copy Reference
"Network Security Ping Sweeps Port Scans" 15 July 2015. Web.21 May. 2025. <
https://www.aceyourpaper.com/essays/network-security-ping-sweeps-port-scans-2152249>

Latest Chicago Format (16th edition)

Copy Reference
"Network Security Ping Sweeps Port Scans", 15 July 2015, Accessed.21 May. 2025,
https://www.aceyourpaper.com/essays/network-security-ping-sweeps-port-scans-2152249