Port Scan

Port Scan

Identifying a Port Scan is crucial in the realm of network security, as it often represents the initial stage of reconnaissance in potential cyber attacks. In a port scan, attackers systematically check a host for open ports by sending client requests to multiple ports and observing the responses. Open ports can reveal about active services, potentially unveiling vulnerabilities that could be exploited for unauthorized access or malicious activities. Early detection of port scans is therefore vital for preemptive security measures, allowing network administrators to assess and fortify their defenses, close unnecessary ports, and monitor suspected sources for further suspicious activities.

ElastiFlow provides a collection of anomaly detection jobs designed to identify port scans including various monitoring strategies and analytical techniques aimed at detecting the distinctive patterns of such reconnaissance activities.

Attributes

AttributeInformation

Analysis Type

population

MITRE ATT&CK Technique

MITRE ATT&CK Tactic

Downloads

SchemaVectorPerspectiveWindowLink

CODEX

direct

edge

fast

CODEX

direct

edge

slow

CODEX

direct

inbound

fast

CODEX

direct

inbound

slow

CODEX

direct

outbound

fast

CODEX

direct

outbound

slow

CODEX

direct

private

fast

CODEX

direct

private

slow

CODEX

distributed

edge

fast

CODEX

distributed

edge

slow

CODEX

distributed

inbound

fast

CODEX

distributed

inbound

slow

CODEX

distributed

outbound

fast

CODEX

distributed

outbound

slow

CODEX

distributed

private

fast

CODEX

distributed

private

slow

ECS

direct

edge

fast

ECS

direct

edge

slow

ECS

direct

inbound

fast

ECS

direct

inbound

slow

ECS

direct

outbound

fast

ECS

direct

outbound

slow

ECS

direct

private

fast

ECS

direct

private

slow

ECS

distributed

edge

fast

ECS

distributed

edge

slow

ECS

distributed

inbound

fast

ECS

distributed

inbound

slow

ECS

distributed

outbound

fast

ECS

distributed

outbound

slow

ECS

distributed

private

fast

ECS

distributed

private

slow

By deploying this suite of anomaly detection jobs, organizations can effectively identify port scanning activities in their early stages. Prompt detection of port scans allows network administrators to take immediate action, such as reconfiguring firewalls, shutting down unnecessary services, or increasing surveillance on critical assets, thereby enhancing the overall security posture of the network and preventing potential breaches.