Port scanning, malicious hacking and the exploitation of web-based information systems' vulnerabilities remains a clear and potent danger to communication and transactions on the World Wide Web. The situation is further complicated by the ubiquitous nature of the Internet and the increasing volumes of private, organizational and institutional information repositories being migrated unto internet platforms. Malicious users sniffing private information engage in port scanning using automated tools hooked on proxy systems to intrude into unsuspecting hosts. A hybrid technique that offers resilient protection against port scanners is proposed.