USING A SPECIALIZED SOFTWARE FOR COMPREHENSIVE MONITORING THE SUSPICIOUS STATES IN COMPUTER NETWORKS

USING A SPECIALIZED SOFTWARE FOR COMPREHENSIVE MONITORING THE SUSPICIOUS STATES IN COMPUTER NETWORKS

Authors

  • Petar Boyanov DEPARTMENT OF COMMUNICATION AND COMPUTER TECHNOLOGY, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712, 115, UNIVERSITETSKA STR

DOI:

https://doi.org/10.46687/jsar.v6i1.152

Keywords:

Computer and network security, cyber-attacks, Monitoring, Penetration, Scanning, Sensors, Vulnerabilities, Windows 7

Abstract

In this paper a comprehensive scanning and monitoring the suspicious states in determined computer networks is made. Most of the computer and network problems with many vulnerabilities are connected. Therefore it is advisable to scan the entire computer network in order to detect weaknesses and accordingly be taken precautions Thanks to the many malicious users will not be able to penetrate in the relevant computer network and to gain access to computer resources.

Author Biography

Petar Boyanov, DEPARTMENT OF COMMUNICATION AND COMPUTER TECHNOLOGY, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712, 115, UNIVERSITETSKA STR

DEPARTMENT OF COMMUNICATION AND COMPUTER TECHNOLOGY, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712, 115, UNIVERSITETSKA STR

ORCID iD icon https://orcid.org/0000-0003-3668-6713  

References

Branam, Michael, et al. Methods, systems, and computer program products for providing network convergence of applications and devices. U.S. Patent Application 11/537,708, 2006.

Deart, Vladimir; Mankov, Vladimir; Pilugin, Alexander. HTTP Traffic Measurements on Access Networks, Analysis of Results and Simulation. In: Smart Spaces and Next Generation Wired/Wireless Networking. Springer Berlin Heidelberg, 2009. p. 180-190.

Gold, Steve. Hacking on the hoof. Engineering & Technology, 2012, 7.3: 80-83.

Manzoor, Umar; Nefti, Samia; Rezgui, Yacine. Categorization of malicious behaviors using ontology-based cognitive agents. Data & Knowledge Engineering, 2013, 85: 40-56.

Manzoor, Umar; Nefti, Samia; Rezgui, Yacine. Autonomous malicious activity inspector–AMAI. In: Natural Language Processing and Information Systems. Springer Berlin Heidelberg, 2010. p. 204-215.

Nualmuenwai, Paramet; Prommak, Chutima. On the Analysis of IP Traffic Distribution in the Network of Suranaree University of Technology. In: Conf. WASET, Thailand. 2011. p. 362-365.

Paessler, A. G. the Network Monitoring Company, PRTG Network Monitor.

Paessler, Dirk. Server Virtualization and Network Management. Database and Network Journal, 2008, 38.5: 13.

Park, Daihee, et al. NetCube: a comprehensive network traffic analysis model based on multidimensional OLAP data cube. International Journal of Network Management, 2013, 23.2: 101-118.

SO-IN, Chakchai. A Survey of Network Traffic Monitoring and Analysis Tools. Cse 576m computer system analysis project, Washington University in St. Louis, 2009.

Song, Yuqian, et al. Towards a framework to support novice users in understanding and monitoring of Home Area Networks. In: Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on. IEEE, 2012. p. 82-87.

Uithol, Michiel, et al. Section 2: Network monitoring based on flow measurement techniques. SURFnet Research on Networking (RON) Project.

Downloads

Published

10.03.2023

How to Cite

Boyanov, P. (2023). USING A SPECIALIZED SOFTWARE FOR COMPREHENSIVE MONITORING THE SUSPICIOUS STATES IN COMPUTER NETWORKS: USING A SPECIALIZED SOFTWARE FOR COMPREHENSIVE MONITORING THE SUSPICIOUS STATES IN COMPUTER NETWORKS. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 6(1), 148–154. https://doi.org/10.46687/jsar.v6i1.152

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 > >>