Quantifying A Network Using Nmap ✓ Solved

Quantifying A Network Using Nmap

Nmap is a network mapper that makes it easy to detect changes and new systems on the network. Typically, it is used in host discovery, port scanning, version detection, and OS detection. In this case, I am using the Nmap software to quantify my home network on my PC. I am using the Windows operating system; therefore, below are the steps on installing and configuring Nmap GUI software on the Windows operating system.

To begin with, it's essential to understand how hackers may attempt to gain access to a network. A hacker will identify the system network ports that are active. If the network ports are vulnerable, they have found a potential backdoor that could allow them to infiltrate the network. Hackers can also gather information on the system by conducting passive footprinting.

Installing and Configuring Nmap Software on Windows

Here are the steps to successfully install and configure Nmap on a Windows operating system:

  1. Browse to and download the latest self-installer.
  2. Run the downloaded .exe file. In the window that opens, accept the license terms.
  3. Choose the components to install. By default, the Zenmap GUI will be installed.
  4. Select the installation location and click install.
  5. The installation should complete in a couple of minutes.

Network Devices and Their Types

Upon scanning my home network, it was revealed that a total of fifteen devices are connected and active at the moment. Some of the identified devices include:

  • Raspberry Pi Foundation device
  • Amazon Technologies device
  • Samsung device
  • Devices manufactured by Dell
  • Laptop and PC
  • Avaya device
  • Liteon technology device
  • Elite Group computer system

In addition to these clearly recognized devices, there were several unknown devices that require a deeper scan to identify fully.

Current User Access

On analyzing the connected devices, it was identified that a Samsung device, possibly belonging to another user, is currently connected to my network. This indicates that there is unauthorized access to the network I have implemented.

Network Policies Implemented

The organization's network policy aims to keep track of the devices connected to the network and identify who is using those devices. By doing so, organizations can detect any devices or individuals that pose a risk to the network's security. Additionally, the network policy outlines the security controls that aim to keep malicious users out, while allowing for some leniency in managing risky users within the home network organization.

Moreover, the security policy provides a framework for the rules that will be enforced concerning network usage and access, ensuring the network remains secure from potential threats.

Conclusion

Using Nmap to quantify and monitor a home network is effective for identifying connected devices and possible vulnerabilities. As shown here, proper installation and configuration of Nmap can reveal crucial information on devices connected to a network, exposing unauthorized access that can lead to security breaches. Furthermore, implementing strict network policies based on the findings from Nmap will aid in managing the security and usability of the home network.

References

  • Medeiros, J. P., Brito Jr., A. M., & Pires, P. S. M. (2009). Computational Intelligence in Security for Information Systems. Advances in Intelligent and Soft Computing, 63, 1-8. doi:10.1007/_1. ISBN.
  • Haines, J., Ryder, D. K., Tinnel, L., & Taylor, S. Validation of sensor alert correlators. IEEE Security & Privacy, 99(1), 46-56. doi:10.1109/MSECP.2003.
  • Mansmann, F., Keirn, D., North, S., Rexroad, B., & Sheleheda, D. (2007). Visual analysis of network traffic for resource planning interactive monitoring. IEEE Transactions on Visualization and Computer Graphics, 13(6), []-[].
  • Paulovich, F. V., Nonato, L. G., Minghim, R., & Levkowitz, H. (2008). Least square projection: A fast high-precision multidimensional projection technique and its application to document mapping. IEEE Transactions on Visualization and Computer Graphics, 14(3), []-[].
  • Harris, J. O., & Larlus, D. (2018). Web-enabled IoT for Smart Home Automation: A Study of Recognizing Devices on Network. Journal of Network and Computer Applications, 103, 26-35. doi:10.1016/j.jnca.2018.01.003.
  • Dai, H., Wei, C., & Wang, T. (2017). Monitoring and Analyzing Network Traffic to Improve Home Network Security. IEEE Access, 5, 21484-21499. doi:10.1109/ACCESS.2017.2760982.
  • Smith, R. F., & Jones, A. B. (2016). Understanding security vulnerabilities on home networks. Proceedings of the IEEE International Symposium on Technologies for Homeland Security, 2016, 1-6.
  • Lee, S., Kim, S., & Mo, Y. (2017). A Study on Using Nmap and its Security Features. International Journal of Computer Applications, 178(2), 6-11. doi:10.5120/ijca2017915322.
  • Okuda, M., & Tanaka, N. (2015). Network security monitoring using open-source tools: A case study with Nmap. Journal of Cyber Security Technology, 1(1), 27-43. doi:10.1080/23742917.2015.1015396.