Port Scan
Port Scan
Identifying a Port Scan is crucial in the realm of network security, as it often represents the initial stage of reconnaissance in potential cyber attacks. In a port scan, attackers systematically check a host for open ports by sending client requests to multiple ports and observing the responses. Open ports can reveal about active services, potentially unveiling vulnerabilities that could be exploited for unauthorized access or malicious activities. Early detection of port scans is therefore vital for preemptive security measures, allowing network administrators to assess and fortify their defenses, close unnecessary ports, and monitor suspected sources for further suspicious activities.
ElastiFlow provides a collection of anomaly detection jobs designed to identify port scans including various monitoring strategies and analytical techniques aimed at detecting the distinctive patterns of such reconnaissance activities.
Attributes
Analysis Type
population
MITRE ATT&CK Technique
MITRE ATT&CK Tactic
Downloads
CODEX
direct
edge
fast
CODEX
direct
edge
slow
CODEX
direct
inbound
fast
CODEX
direct
inbound
slow
CODEX
direct
outbound
fast
CODEX
direct
outbound
slow
CODEX
direct
private
fast
CODEX
direct
private
slow
CODEX
distributed
edge
fast
CODEX
distributed
edge
slow
CODEX
distributed
inbound
fast
CODEX
distributed
inbound
slow
CODEX
distributed
outbound
fast
CODEX
distributed
outbound
slow
CODEX
distributed
private
fast
CODEX
distributed
private
slow
ECS
direct
edge
fast
ECS
direct
edge
slow
ECS
direct
inbound
fast
ECS
direct
inbound
slow
ECS
direct
outbound
fast
ECS
direct
outbound
slow
ECS
direct
private
fast
ECS
direct
private
slow
ECS
distributed
edge
fast
ECS
distributed
edge
slow
ECS
distributed
inbound
fast
ECS
distributed
inbound
slow
ECS
distributed
outbound
fast
ECS
distributed
outbound
slow
ECS
distributed
private
fast
ECS
distributed
private
slow
By deploying this suite of anomaly detection jobs, organizations can effectively identify port scanning activities in their early stages. Prompt detection of port scans allows network administrators to take immediate action, such as reconfiguring firewalls, shutting down unnecessary services, or increasing surveillance on critical assets, thereby enhancing the overall security posture of the network and preventing potential breaches.