scispace - formally typeset
Search or ask a question

Answers from top 8 papers

More filters
Papers (8)Insight
On the assumption that the signal sources are nodes in an underwater network, this method can be used to estimate the number of network nodes.
This can be used by a network designer to estimate the tradeoff between how connected the network is, the number of nodes, the area of operation, and transmission range of nodes.
Proceedings ArticleDOI
Zhang Jiawan, Li Liang, Lu Liangfu, Zhou Ning 
13 Dec 2008
13 Citations
The experiments show that ScanViewer can not only detect network scans, port scans, distributed port scans, but also can detect the hidden scans etc.
Open accessJournal ArticleDOI
Ala Trusina, Martin Rosvall, Kim Sneppen 
48 Citations
We further suggest how the ability to locate specific nodes can be improved if information associated with the overall traffic in the network is available.
Experimental result on identification of signatures in the fingerprint database of Nmap 4.90RC1 but not known for Nmap 4.76 show that our method is effective in the discovery of new signatures not included in current fingerprint database.
Therefore, it is possible to compute the required number of nodes of each type for given network parameters.
Open accessProceedings ArticleDOI
08 Jun 2005
123 Citations
In particular, we show that it scales better with the number of nodes in the network.
The detection result could be used by other nodes to protect the network.

Related Questions

How to minimize false detection on network monitoring?4 answersTo minimize false detections in network monitoring, a new framework for scoring communications is proposed. This framework uses a graph convolutional network-based suspicious communication pair estimation to judge whether communications not present in whitelists are normal or anomalous. By using this method, security operators can focus on significant alerts and reduce false positives. Additionally, an online adaptive measurement technique is suggested, which dynamically selects a subset of nodes as monitors and estimates the measurements of the remaining nodes using computed correlations. This technique exploits measurement correlation in real networks to reduce monitoring overhead and can significantly decrease the estimation error while incurring a low overhead. By applying a change detection algorithm, the estimation error can be further reduced.
Does everyone benefit from Nmap?4 answersNmap is a versatile information gathering tool that is widely used in the field of cybersecurity. It is particularly beneficial for network administrators, IT security professionals, pen-testers, and security researchers. Nmap allows users to scan networks, identify live hosts, detect specific services or operating systems, and perform advanced scanning techniques. Additionally, Nmap can be automated and customized to make it easier for users, especially beginners or those new to cybersecurity. However, Nmap's benefits are not limited to cybersecurity. In the healthcare sector, NMAP is used as an academic gateway to provide high-quality internet resources for nurses, midwives, and allied health professionals. Furthermore, Nmap can also be utilized in power management frameworks to improve energy efficiency in data centers. Overall, Nmap offers a wide range of benefits and applications across various domains.
What are the challenges in using MRI for NM detection?5 answersMRI for tumor detection faces several challenges. Firstly, the segmentation of brain tumors from MRI images is a complex and tedious task due to the different shapes, locations, and image intensities of different types of tumors. Secondly, MRI images are often affected by various types of noise, such as Gaussian noise, salt pepper noise, and speckle noise, which need to be removed for accurate diagnosis. Thirdly, the diversity of brain anatomy and the need for annotated datasets make it challenging to use supervised deep learning techniques for tumor detection. Lastly, accurately generating the complex structure of the human brain using generative models remains a challenge, although recent diffusion models have shown promise.
What is nmap?5 answersNmap is a versatile and popular network scanning tool used in cybersecurity for information gathering about hosts and networks. It can be fine-tuned using the command line, but its vast functionality can be overwhelming for beginners. To address this, a toolkit based on Nmap has been automated to simplify its usage and achieve the same results. This toolkit is designed to make Nmap easier to use for new students, beginners, and script kiddies in the field of cybersecurity. Nmap is an open-source utility that is built into Kali Linux and is used for network discovery, security scanning, and footprinting. It provides detailed information about the target and can be utilized to understand the concept of footprinting, what hackers look for, and how to defend against it. Nmap is continuously being improved and expanded by its developers, making it an indispensable tool for network monitoring, diagnostics, and vulnerability detection.
What are some network traffic analysis for detecting apt's?5 answersNetwork traffic analysis is an important method for detecting Advanced Persistent Threats (APTs). Several papers propose different approaches for this purpose. Cho Do Xuan et al. propose a method based on abnormal behaviors of network traffic using machine learning. They define abnormal behaviors of APT attacks in both the domain and IP components and classify them using the Random Forest classification algorithm. Another paper by Wu Jianhua et al. presents a method that dynamically analyzes suspicious file samples to obtain malicious network information and optimizes policy configurations for abnormal traffic analysis. G. Zhao et al. propose a system that uses malicious DNS analysis techniques to detect suspicious APT malware command and control (C&C) domains and analyzes the traffic of corresponding suspicious IPs using signature-based and anomaly-based detection technology. These papers provide different techniques for network traffic analysis to detect APTs.
How many Mac address a network node like a switch can have?8 answers