International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 186 - Number 77 |
Year of Publication: 2025 |
Authors: Stephane J. Tamafo, Elie Fute Tagne, Jaime C. Acosta, Charles Kamhoua, Rawat Danda |
![]() |
Stephane J. Tamafo, Elie Fute Tagne, Jaime C. Acosta, Charles Kamhoua, Rawat Danda . Attack Information Gathering from Network Analysis Data during Scanning Activity. International Journal of Computer Applications. 186, 77 ( Apr 2025), 1-10. DOI=10.5120/ijca2025924673
The rise of cloud computing, remote work, and IoT has heightened the risk of cyberattacks, exposing sensitive data to advanced threats. Traditional security measures, such as cryptography and intrusion detection systems, often fail against zero-day exploits. This paper proposes a proactive approach to network security by identifying scanning tools and targeted services during the reconnaissance phase of an attack. By analyzing network scanning activities, it becomes possible to detect the tools, techniques, and targeted services used by attackers, enabling preemptive defense. The methodology involves capturing network traffic during scans, extracting key features, and using decision tree-based machine learning models to classify scanning tools, techniques, and services. Experiments conducted with theWeka tool demonstrate high accuracy in identifying scanning techniques (96.8%) and targeted services (98%). This approach provides critical insights into attackers’ intentions, allowing for tailored defensive measures before an attack escalates. The results underscore the effectiveness of machine learning in enhancing network security by preemptively identifying and mitigating potential threats.