ZyXEL Communications 1000 Network Router User Manual


  Open as PDF
of 1075
 
Chapter 35 ADP
ZyWALL USG 1000 User’s Guide
610
Decoy Port Scans
Decoy port scans are scans where the attacker has spoofed the source address.
These are some decoy scan types:
•TCP Decoy Portscan
UDP Decoy Portscan
IP Decoy Portscan
Distributed Port Scans
Distributed port scans are many-to-one port scans. Distributed port scans occur
when multiple hosts query one host for open services. This may be used to evade
intrusion detection. These are distributed port scan types:
TCP Distributed Portscan
UDP Distributed Portscan
IP Distributed Portscan
Port Sweeps
Many different connection attempts to the same port (service) may indicate a port
sweep, that is, they are one-to-many port scans. One host scans a single port on
multiple hosts. This may occur when a new exploit comes out and the attacker is
looking for a specific service. These are some port sweep types:
TCP Portsweep
UDP Portsweep
•IP Portsweep
•ICMP Portsweep
Filtered Port Scans
A filtered port scan may indicate that there were no network errors (ICMP
unreachables or TCP RSTs) or responses on closed ports have been suppressed.
Active network devices, such as NAT routers, may trigger these alerts if they send
out many connection attempts within a very small amount of time. These are
some filtered port scan examples.
TCP Filtered
Portscan
UDP Filtered Portscan IP Filtered Portscan
TCP Filtered Decoy
Portscan
•UDP Filtered Decoy
Portscan
IP Filtered Decoy
Portscan
TCP Filtered
Portsweep
UDP Filtered Portsweep IP Filtered Portsweep