References
- Shodan, http://www.shodanhq.com/
- Censys, https://www.censys.io
- NMAP, https://nmap.org/
- Z. Durumeric, D. Adrian, A. Mirian, M. Bailey, and J. A. Halderman, "A search engine backed by Internet-wide scanning," in Proc. ACM SIGSAG 2015, pp. 542-553, Denver, USA, Oct. 2015.
- G. S. Rao, P. N. Kumar, P. Swetha, and G. BhanuKiran, "Security assessment of computer networks -an ethical hacker's perspective," in Proc. IEEE ICCCT 2014, Allahabad, India, Dec. 2014.
- Y. Jung and M. Park, "Network defense mechanism based on Isolated Networks," J. KICS, vol. 41, no. 9, pp. 1103-1107, Sept. 2016. https://doi.org/10.7840/kics.2016.41.9.1103
- J. Jo, H. Jang, K. Lee, and J. Kong, "SDN-based intrusion prevention system for science DNZ," J. KICS, vol. 40, no. 6, pp. 1070-1080, Jun. 2015. https://doi.org/10.7840/kics.2015.40.6.1070
- H. Lim, W. Kim, H. Noh, and J. Lim, "Research on malware classification with network activity for classification and attack prediction of attack group," J. KICS, vol. 42, no. 1, pp. 193-204, Jan. 2017 https://doi.org/10.7840/kics.2017.42.1.193
- S. Kumar and S. D. Sudarsan, "An innovative UDP port scanning technique," Int. J. Future Computer and Commun.. vol. 3, no. 6, Dec. 2014.
- X. Zhang, J. Knockel, and J. R. Crandall, "Original SYN: Finding machines hidden behind firewalls," in Proc. IEEE INFOCOM 2015, Hong Kong, China, May 2015.
- L. Markowsky and G. Markowsky, "Scanning for vulnerable devices in the internet of things," in Proc. IEEE IDAACS 2015, vol. 1, pp. 463-467, Warsaw, Poland, Sept. 2015.
- V. Kathayat and L. Ahuja, "Network security with open source firewall," Int. Res. J. Comput. and Electron. Eng., vol. 1, no. 1, May 2013.
- S. Shin and G. Gu, "Attacking software-defined networks: A first feasibility study," in Proc. ACM HotSDN 2013, pp. 165-166, Hong Kong, China, Aug. 2013.
- S. Scott-Hayward, G. O'Callaghan, and S. Sezer, "SDN security: A survey," in Proc. IEEE SDN4FNS 2013, pp. 1-7, Trento, Italy, Nov. 2013.
- I. Ahmad, S. Namal, M. Ylianttila, and A. Gurtov, "Security in software defined networks: A survey," J. IEEE Commun. Surveys & Tuts., vol. 17, no. 4, pp. 2317-2346, 2015. https://doi.org/10.1109/COMST.2015.2474118
- H. Mohammadzadeh, M. Mansoori, and I. Welch, "Evaluation of fingerprinting techniques and a windows-based dynamic honeypot," in Proc. Australasian Info. Sec. Conf., vol. 138, Adelaide, Australia, Jan. 2013.