Port scanning allows “black -hats” to listen to specific services (ports) that could be associated to well-known vulnerabilities [7], [8]. During a scan, an attacker attempts
to determine the address of a host, the set of Transmission Control Protocol (TCP) and User Datagram Protocol(UDP) ports being listened to by the host.