Docs
test1test2
6.5
6.5
  • ElastiFlow Documentation
  • Unified Flow Collector
    • General Configuration
    • Changelog
    • Maxmind GeoIP2 and GeoLite2
    • RiskIQ PassiveTotal
    • Network Interfaces
    • User-Defined Metadata
    • Docker
    • Linux
    • Unified Flow Collector Introduction
    • System Requirements
    • Supported IEs
    • AWS VPC Flow Log IEs
    • IPFIX IEs
    • Netflow IEs
    • sFlow IEs
  • Unified SNMP Collector
    • Device Groups
    • Changelog
    • Devices
    • Downloading Definitions
    • Enumerations
    • Objects
    • Object Groups
    • User-Defined Metadata
    • Docker
    • Network Interfaces
    • United SNMP Collector Introduction
    • Linux
    • Scheduling Rediscovery
  • Monitoring ElastiFlow
    • Liveness & Readiness
    • Metrics
    • Prometheus & Grafana
  • Configuration Reference
    • YAML Configuration Files
    • Configuration Reference Overview
    • Common
      • API
      • Licensing
      • Overview
      • Logging
      • HTTP output
      • Elasticsearch output
      • Kafka output
      • Monitor output
      • OpenSearch output
      • Splunk output
      • stdout output
      • Processor
    • Unified Flow Collector
      • Overview
      • Community/Conversation IDs
      • EF_PROCESSOR_ENRICH_TOTALS_IF_NO_DELTAS
      • Overview
      • RiskIQ PassiveTotal
      • Maxmind
      • User-Defined Metadata
      • Overview
      • Overview
      • User-Defined Metadata
      • Overview
      • Benchmark Input
      • Netflow/IPFIX/sFlow (UDP)
      • Licensing
      • Decoder/Processor
      • Sample Rate
      • Configuration Changes
    • Unified SNMP Collector
      • User-Defined Metadata
      • Overview
      • Licensing
      • SNMP Poller
      • EF_PROCESSOR_SNMP_ENUM_DEFINITIONS_DIRECTORY_PATH
  • API Reference
    • API Reference Overview
    • SNMP Operations
  • Data Platforms
    • Elastic
      • Basic Cluster
      • Advanced Cluster
      • Single Server
      • Multi-Tier Cluster
      • Single "Lab" Server
      • Elasticsearch
      • ElastiFlow vs. Filebeat and Logstash
      • RHEL/CentOS
      • Ubuntu/Debian
      • Kibana
      • ML
        • Network Security
        • Machine Learning
        • Availability
          • Network Availability
          • DHCP
          • LDAP
          • DNS
          • NTP
          • RADIUS
          • TCP Sessions
        • Network Security Activity
          • Rare Autonomous System
          • Network Activity
          • Rare Conversation
          • Rare Geolocation
        • Network Security Brute Force
          • Brute Force CLI Access
          • Brute Force Remote Desktop Access
          • Brute Force Attacks
        • Network Security DDoS
          • Denial-of-Service
          • ICMP Flood Attack
          • SYN Flood Attack
          • TCP DDoS Attack
          • UDP Amplification Attack
        • Network Security Recon
          • ICMP Scan
          • Reconnaissance
          • Port Scan
        • Performance
          • Unusual ASN Traffic Volume
          • Unusual Network Interface Traffic Volume
          • Network Performance
    • Opensearch
      • Dashboards
      • Auth Sig V4
    • Splunk
      • Default Search Macro
      • Configuring Data Input & Index
      • Splunk App Installation
    • Output Configuration
  • Additional Guides
    • Catalyst (sFlow)
    • FortiGate
    • hsflowd
    • Configuring Flow Sampling on Juniper Routers
    • Junos OS (sFlow)
    • MikroTik RouterOS
    • OpenWRT (softflowd)
    • Ubiquiti EdgeRouter
    • SonicWall
    • Junos OS
    • Extending SNMP Device Support
    • Flow Device Support Overview
    • SNMP Device Support Overview
    • Generating A Support Bundle
  • FAQ
    • Flows stopped showing up in Kibana (Disk(s) Full)
    • Common reasons why you have discrepancies between ElastiFlow data & reality
    • What Are Snapshots?
    • Importing the wrong dashboards (No data)
  • Knowledge Base
    • Config
      • Elasticsearch Authentication Failure
      • CA Certificate Path Incorrect
      • license/error Invalid Segments
    • Flow
      • Bidirectional Flow Support
      • Configure the UDP Input
      • Flow Records Not Received
      • Netflow v9/IPFIX Template Not Receieved
      • Unsupported sFlow Structures
    • General
      • License Has Expired
      • License Agreement Not Accepted
    • Install
      • .deb Upgrade Fails File Overwrite
    • Operation
      • Flow Collector Queues 90% Full
      • Dashboard Updates
      • Change elastiflow-* Index Name?
  • Elastic Stack Deployment
  • Download Links
Powered by GitBook
On this page
  1. Data Platforms
  2. Elastic
  3. ML
  4. Network Security Recon

Port Scan

Port Scan

Identifying a Port Scan is crucial in the realm of network security, as it often represents the initial stage of reconnaissance in potential cyber attacks. In a port scan, attackers systematically check a host for open ports by sending client requests to multiple ports and observing the responses. Open ports can reveal about active services, potentially unveiling vulnerabilities that could be exploited for unauthorized access or malicious activities. Early detection of port scans is therefore vital for preemptive security measures, allowing network administrators to assess and fortify their defenses, close unnecessary ports, and monitor suspected sources for further suspicious activities.

ElastiFlow provides a collection of anomaly detection jobs designed to identify port scans including various monitoring strategies and analytical techniques aimed at detecting the distinctive patterns of such reconnaissance activities.

Attributes

Attribute
Information

Analysis Type

population

MITRE ATT&CK Technique

MITRE ATT&CK Tactic

Downloads

Schema
Vector
Perspective
Window
Link

CODEX

direct

edge

fast

CODEX

direct

edge

slow

CODEX

direct

inbound

fast

CODEX

direct

inbound

slow

CODEX

direct

outbound

fast

CODEX

direct

outbound

slow

CODEX

direct

private

fast

CODEX

direct

private

slow

CODEX

distributed

edge

fast

CODEX

distributed

edge

slow

CODEX

distributed

inbound

fast

CODEX

distributed

inbound

slow

CODEX

distributed

outbound

fast

CODEX

distributed

outbound

slow

CODEX

distributed

private

fast

CODEX

distributed

private

slow

ECS

direct

edge

fast

ECS

direct

edge

slow

ECS

direct

inbound

fast

ECS

direct

inbound

slow

ECS

direct

outbound

fast

ECS

direct

outbound

slow

ECS

direct

private

fast

ECS

direct

private

slow

ECS

distributed

edge

fast

ECS

distributed

edge

slow

ECS

distributed

inbound

fast

ECS

distributed

inbound

slow

ECS

distributed

outbound

fast

ECS

distributed

outbound

slow

ECS

distributed

private

fast

ECS

distributed

private

slow

By deploying this suite of anomaly detection jobs, organizations can effectively identify port scanning activities in their early stages. Prompt detection of port scans allows network administrators to take immediate action, such as reconfiguring firewalls, shutting down unnecessary services, or increasing surveillance on critical assets, thereby enhancing the overall security posture of the network and preventing potential breaches.

PreviousReconnaissanceNextPerformance

Network Service Scanning (T1046)
Discovery (TA0007)
elastiflow_codex_netsec_port_scan_direct_edge_fast
elastiflow_codex_netsec_port_scan_direct_edge_slow
elastiflow_codex_netsec_port_scan_direct_in_fast
elastiflow_codex_netsec_port_scan_direct_in_slow
elastiflow_codex_netsec_port_scan_direct_out_fast
elastiflow_codex_netsec_port_scan_direct_out_slow
elastiflow_codex_netsec_port_scan_direct_priv_fast
elastiflow_codex_netsec_port_scan_direct_priv_slow
elastiflow_codex_netsec_port_scan_distrib_edge_fast
elastiflow_codex_netsec_port_scan_distrib_edge_slow
elastiflow_codex_netsec_port_scan_distrib_in_fast
elastiflow_codex_netsec_port_scan_distrib_in_slow
elastiflow_codex_netsec_port_scan_distrib_out_fast
elastiflow_codex_netsec_port_scan_distrib_out_slow
elastiflow_codex_netsec_port_scan_distrib_priv_fast
elastiflow_codex_netsec_port_scan_distrib_priv_slow
elastiflow_ecs_netsec_port_scan_direct_edge_fast
elastiflow_ecs_netsec_port_scan_direct_edge_slow
elastiflow_ecs_netsec_port_scan_direct_in_fast
elastiflow_ecs_netsec_port_scan_direct_in_slow
elastiflow_ecs_netsec_port_scan_direct_out_fast
elastiflow_ecs_netsec_port_scan_direct_out_slow
elastiflow_ecs_netsec_port_scan_direct_priv_fast
elastiflow_ecs_netsec_port_scan_direct_priv_slow
elastiflow_ecs_netsec_port_scan_distrib_edge_fast
elastiflow_ecs_netsec_port_scan_distrib_edge_slow
elastiflow_ecs_netsec_port_scan_distrib_in_fast
elastiflow_ecs_netsec_port_scan_distrib_in_slow
elastiflow_ecs_netsec_port_scan_distrib_out_fast
elastiflow_ecs_netsec_port_scan_distrib_out_slow
elastiflow_ecs_netsec_port_scan_distrib_priv_fast
elastiflow_ecs_netsec_port_scan_distrib_priv_slow