Friday, May 7, 2021

Do Hackers Look Before They Leap?

Port scanning, the act of sweeping computer ports to discover which port is open, has long been assumed to be a principal first step of any hacker.

But that may not necessarily be the case, according to a new report from researchers at the University of Maryland (UM).

In UM’s test environment, port scans preceded attacks in only 5 percent of cases. The report also found that more than half of all attacks are not actually predicated by any type of scan. “Hackers don’t necessarily look before they leap,” the study concludes.

“I was surprised that the percentage was that low,” Michel Cukier, a UM assistant professor and one of the report’s authors, said.

Cukier noted that the results may have been influenced by some the decisions made in UM’s testbed.

“It would be interesting to repeat the experiment on other locations with other choices,” Cukier told internetnews.com.

Though port scanning was not a predictor for attacks, vulnerability scans do in fact lead to attacks in a significant percentage of cases. The UM report defines vulnerability scanning as a scan “used to fingerprint the presence or absence of an exploitable vulnerability.”

This article was first published on InternetNews.com. To read the full article, click here.

Similar articles

Latest Articles

What is Raw Data?

By itself, raw data doesn’t look like much or mean much, but it has the potential to be processed for analysis.  Processed data comes from...

What is Data Analysis?

Everything measurable that has happened, is happening, and will happen in a business can be boiled down to data. But not all data is...

IBM Begins Cloud Confidentiality...

IBM has positioned its cloud offering against the unique security, compliance and confidentiality needs of specific vertical markets with a sharp focus on finance...

Top Big Data Certifications...

The term Big Data reflects a very real growing trend. By 2020, every human will be generating an astounding 1.7 MB per second. That...