IMPLEMENTATION OF SOFTWARE APPLICATION FOR NETWORK PORT SCANNING IN ANDROID BASED OPERATING SYSTEMS

IMPLEMENTATION OF SOFTWARE APPLICATION FOR NETWORK PORT SCANNING IN ANDROID BASED OPERATING SYSTEMS

Authors

  • Petar Boyanov Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

DOI:

https://doi.org/10.46687/jsar.v23i1.354

Keywords:

Algorithm, Analysis, Android, Connection, Libraries, Monitoring, Network, Ports, Python, Scanning, Services, Traffic, Threads

Abstract

In this paper implementation of software application using linear algorithm for network port scanning in android based operating systems is made.

Author Biography

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

ORCID iD icon https://orcid.org/0000-0003-3668-6713

References

Arkamburge, Python Quick Basics and Advacnced programming Guide for Dummies and beginners on coding in computer science design using tricks with javascipt along learning to network and hack quickly: Guide 2 code. Independently published, ISBN-13 ‏979-8768745837, 2021, p. 193.

Ballmann, B., Understanding Network Hacks: Attack and Defense with Python 3 2nd ed. Springer, ISBN-10 ‏3662621592, ISBN-13 ‏978-3662621592, 2022, p. 236.

Ballmann, B., Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python 3 (German Edition). Springer, ISBN-10 ‏3662616351, ISBN-13 ‏978-3662616352, 2020, p. 237.

Calderon, P., Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips, 3rd Edition, Packt Publishing, ISBN-10 ‏1838649352, ISBN-13 ‏978-1838649357, 2021, p. 436.

Candel, J., Mastering Python for Networking and Security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues, 2nd Edition. Packt Publishing, ISBN-10 ‏1839217162, ISBN-13 ‏978-1839217166, 2021, p. 538.

Candel, J., Sarker, M., Washington, S., Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition. Packt Publishing, ASIN ‏B07Q4SDBGZ, 2019, p. 492.

Candel, J., Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues. Packt Publishing, ISBN-10 1788992512, ISBN-13 978-1788992510, 2018, p. 426.

Candel, J., Hacking ético con herramientas Python (Colecciones ABG - Informática y Computación) (Spanish Edition). American Book Group, ISBN-10 168165699X, ISBN-13 978-1681656991, 2020, p. 290.

Choi, B., Introduction to Python Network Automation: The First Journey 1st ed. Edition. Apress, ISBN-10 1484268059, ISBN-13 978-1484268056, 2021, p. 896.

Chou, E., Kennedy, M., Whaley, M., Mastering Python Networking: Your one-stop solution to using Python for network automation, programmability, and DevOps, 3rd Edition. Packt Publishing, ISBN-10 ‏1839214678, ISBN-13 ‏978-1839214677, 2020, p. 576.

Codings, Z., Python Machine Learning: A Beginner’s Guide to Python Programming for Machine Learning and Deep Learning, Data Analysis, Algorithms and Data Science With Scikit Learn, TensorFlow, PyTorch and Keras. Independently published, ISBN-10 1696563119, ISBN-13 ‏978-1696563116, 2019, p. 147.

Codings, Z., Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity Fundamentals. Independently published, ISBN-10 ‏1671532902, ISBN-13 ‏978-1671532908, 2019, p. 408.

David, M., Mastering Python Network Programming: learn Network programming in simple and easy steps using Python as a programming language. Independently published, ISBN-13 ‏979-8758780589, 2021, p. 103.

Diogenes, Y., Ozkaya, E., Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition. Packt Publishing, ISBN-10 ‏183882779X, ISBN-13 ‏978-1838827793, 2019, p. 634.

Friedman, J., Hoffman, D. V., Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses, Information, Knowledge, Systems Management 7, №. 1, 2008, pp. 159–180.

Genov, B., Nedelchev, D., Mihovski, M., Mirchev, Y., Comprehensive approach for service life assessment of solid-propellant rocket motors. International Journal "NDT Days", Volume II, Issue 4, 2019, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 467-475.

Genov, B., NDT Assessment Model for Missile Motors. International Journal "NDT Days", Volume I, Issue 4, 2018, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 484-493.

Genov, B., Criteria for Selection of NDT in the Ammunition Life Cycle. International Journal "NDT Days", Volume I, Issue 4, 2018, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 494-503.

Genov, B., Kirkov, D., Mihovski, M., Mirchev, Y., Ageing of Solid Rocket Propellants Investigated by Ultrasound Technique. International Journal "NDT Days", Volume I, Issue 5, 2018, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 577-582.

Grubb, S., How Cybersecurity Really Works: A Hands-On Guide for Total Beginners. No Starch Press, ISBN-10 ‏1718501285, ISBN-13 ‏978-1718501287, 2021, p. 216.

Iliev, R., K. Ignatova. Implementation of cloud technologies for building data centers in defence and security. Information & Security: An International Journal 43, No. 1. 2019, ISSN 0861-5160, pp. 89-97., https://doi.org/10.11610/isij.4308.

Iliev, R., K. Ignatova. Cloud technologies for building data center system for defense and security. T. Tagarev et al. (eds.), Digital Transformation, Cyber Security and Resilience of Modern Societies, Studies in Big Data 84, , ISBN 978-3-030-65721-5, Springer 2020, pp. 13-24, https://doi.org/10.1007/978-3-030-65722-2.

Kaur, R., Singh, G. Analysing, Port Scanning Tools and Security Techniques, International Journal of Electrical Electronics & Computer Science Engineering, Volume 1, Issue 5, October 2014, ISSN 2348 2273, pp. 58–64.

Pavlova, D., Dzhelepov, V., Gindev, P., Effectiveness of information security in computer systems for object and process management. 13th International traveling seminar, Modern dimensions in European education and research area. Bulgarian-Austrian cultural dialogue, 26-31 May 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 241-249. ISSN 2367-7988.

Radoeva, N., Iliev, R., A measurement process model implemented by generalized net. IEEE 8th International Conference on Intelligent Systems (IS), September 3-6, 2016, pp. 574-578, ISBN:978-1-5090-1355-5, DOI: 10.1109/IS.2016.7737482.

Downloads

Published

26.03.2023

How to Cite

Boyanov, P. (2023). IMPLEMENTATION OF SOFTWARE APPLICATION FOR NETWORK PORT SCANNING IN ANDROID BASED OPERATING SYSTEMS: IMPLEMENTATION OF SOFTWARE APPLICATION FOR NETWORK PORT SCANNING IN ANDROID BASED OPERATING SYSTEMS. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 23(1), 60–72. https://doi.org/10.46687/jsar.v23i1.354

Issue

Section

Communication and computer technologies

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 > >>