IMPLEMENTATION OF MODIFIED SCRIPT FOR LINUX BASED OPERATING SYSTEMS USING A LINEAR ALGORITHM FOR NETWORK PORT SCANNING

IMPLEMENTATION OF MODIFIED SCRIPT FOR LINUX BASED OPERATING SYSTEMS USING A LINEAR ALGORITHM FOR NETWORK PORT SCANNING

Authors

  • Petar Boyanov DEPARTMENT OF MANAGEMENT OF SECURITY SYSTEMS, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712,115, UNIVERSITETSKA STR.

DOI:

https://doi.org/10.46687/jsar.v23i1.353

Keywords:

Analysis, Connection, Monitoring, Network, Ports, Python, Scanning, Services, Traffic

Abstract

The Python programming language has various module libraries for network scanning of hosts. In this paper the performance and implementation of a modified script for Linux based operating systems using a linear algorithm for network port scanning is presented.

Author Biography

Petar Boyanov, DEPARTMENT OF MANAGEMENT OF SECURITY SYSTEMS, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712,115, UNIVERSITETSKA STR.

DEPARTMENT OF MANAGEMENT OF SECURITY SYSTEMS, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712,115, UNIVERSITETSKA STR.

ORCID iD icon https://orcid.org/0000-0003-3668-6713

References

Arkamburge, Python Quick Basics and Advacnced programming Guide for Dummies and beginners on coding in computer science design using tricks with javascipt along learning to network and hack quickly: Guide 2 code. Independently published, ISBN-13 ‏979-8768745837, 2021, p. 193.

Arnodlz, J., Python for Hackers and Pentesters full guides: you’ll explore the darker side of Python’s capabilities - writing network sniffers, stealing email ... fuzzers, infecting virtual machines.... Independently published, ISBN-13 ‏979-8712511532, 2021, p. 185.

Ballmann, B., Understanding Network Hacks: Attack and Defense with Python 3 2nd ed. Springer, ISBN-10 ‏3662621592, ISBN-13 ‏978-3662621592, 2022, p. 236.

Ballmann, B., Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python 3 (German Edition). Springer, ISBN-10 ‏3662616351, ISBN-13 ‏978-3662616352, 2020, p. 237.

Candel, J., Mastering Python for Networking and Security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues, 2nd Edition. Packt Publishing, ISBN-10 ‏1839217162, ISBN-13 ‏978-1839217166, 2021, p. 538.

Candel, J., Sarker, M., Washington, S., Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition. Packt Publishing, ASIN ‏B07Q4SDBGZ, 2019, p. 492.

Candel, J., Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues. Packt Publishing, ISBN-10 1788992512, ISBN-13 978-1788992510, 2018, p. 426.

Candel, J., Hacking ético con herramientas Python (Colecciones ABG - Informática y Computación) (Spanish Edition). American Book Group, ISBN-10 168165699X, ISBN-13 978-1681656991, 2020, p. 290.

Choi, B., Introduction to Python Network Automation: The First Journey 1st ed. Edition. Apress, ISBN-10 1484268059, ISBN-13 978-1484268056, 2021, p. 896.

Chou, E., Kennedy, M., Whaley, M., Mastering Python Networking: Your one-stop solution to using Python for network automation, programmability, and DevOps, 3rd Edition. Packt Publishing, ISBN-10 ‏1839214678, ISBN-13 ‏978-1839214677, 2020, p. 576.

Codings, Z., Python Machine Learning: A Beginner’s Guide to Python Programming for Machine Learning and Deep Learning, Data Analysis, Algorithms and Data Science With Scikit Learn, TensorFlow, PyTorch and Keras. Independently published, ISBN-10 1696563119, ISBN-13 ‏978-1696563116, 2019, p. 147.

Codings, Z., Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity Fundamentals. Independently published, ISBN-10 ‏1671532902, ISBN-13 ‏978-1671532908, 2019, p. 408.

David, M., Mastering Python Network Programming: learn Network programming in simple and easy steps using Python as a programming language. Independently published, ISBN-13 ‏979-8758780589, 2021, p. 103.

Elghaly, Y., Learn Penetration Testing with Python 3.x: Perform Offensive Pentesting and Prepare Red Teaming to Prevent Network Attacks and Web Vulnerabilities (English Edition). BPB Publications, ISBN-10 9390684919, ISBN-13 ‏978-9390684915, 2021, p. 344.

Genov, B., Nedelchev, D., Mihovski, M., Mirchev, Y., Comprehensive approach for service life assessment of solid-propellant rocket motors. International Journal "NDT Days", Volume II, Issue 4, 2019, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 467-475.

Genov, B., NDT Assessment Model for Missile Motors. International Journal "NDT Days", Volume I, Issue 4, 2018, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 484-493.

Genov, B., Criteria for Selection of NDT in the Ammunition Life Cycle. International Journal "NDT Days", Volume I, Issue 4, 2018, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 494-503.

Genov, B., Kirkov, D., Mihovski, M., Mirchev, Y., Ageing of Solid Rocket Propellants Investigated by Ultrasound Technique. International Journal "NDT Days", Volume I, Issue 5, 2018, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 577-582.

Iliev, R., K. Ignatova. Implementation of cloud technologies for building data centers in defence and security. Information & Security: An International Journal 43, No. 1. 2019, ISSN 0861-5160, pp. 89-97., https://doi.org/10.11610/isij.4308.

Iliev, R., K. Ignatova. Cloud technologies for building data center system for defense and security. T. Tagarev et al. (eds.), Digital Transformation, Cyber Security and Resilience of Modern Societies, Studies in Big Data 84, , ISBN 978-3-030-65721-5, Springer 2020, pp. 13-24, https://doi.org/10.1007/978-3-030-65722-2.

Pavlova. D., Gindev, P. Designing an intelligent system for knowledge and process management in a university information environment. INTED2020 Proceedings. 14th International Technology, Education and Development Conference, Valencia, Spain, 2nd-4th March 2020, pp. 2743-2747. ISBN: 978-84-09-17939-8 doi: 10.21125/inted.2020.0818.

Pavlova, D., Dzhelepov, V., Gindev, P., Effectiveness of information security in computer systems for object and process management. 13th International traveling seminar, Modern dimensions in European education and research area. Bulgarian-Austrian cultural dialogue, 26-31 May 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 241-249. ISSN 2367-7988.

Pavlova, D., Gindev, P., System synthesis approach for intelligent knowledge management. 13th International traveling seminar, Modern dimensions in European education and research area. Bulgarian-Austrian cultural dialogue, 26-31 May 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 250-257. ISSN 2367-7988.

Pavlova, D., Gindev, P., A System for Intelligent Electronic Management of Knowledge and Business Processes in a University Information Environment. Proceedings of Seventh National Seminar with international participation - Intellectual property and digital people, 24 April 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 221-234. ISBN 978-619-185-379-3.

Radoeva, N., Iliev, R., A measurement process model implemented by generalized net. IEEE 8th International Conference on Intelligent Systems (IS), September 3-6, 2016, pp. 574-578, ISBN:978-1-5090-1355-5, DOI: 10.1109/IS.2016.7737482.

Downloads

Published

26.03.2023

How to Cite

Boyanov, P. (2023). IMPLEMENTATION OF MODIFIED SCRIPT FOR LINUX BASED OPERATING SYSTEMS USING A LINEAR ALGORITHM FOR NETWORK PORT SCANNING : IMPLEMENTATION OF MODIFIED SCRIPT FOR LINUX BASED OPERATING SYSTEMS USING A LINEAR ALGORITHM FOR NETWORK PORT SCANNING . JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 23(1), 48–59. https://doi.org/10.46687/jsar.v23i1.353

Issue

Section

Communication and computer technologies

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 > >>