IMPLEMENTATION OF MODIFIED NETWORK PORT SCANNER FOR WINDOWS BASED OPERATING SYSTEMS
IMPLEMENTATION OF MODIFIED NETWORK PORT SCANNER FOR WINDOWS BASED OPERATING SYSTEMS
DOI:
https://doi.org/10.46687/jsar.v23i1.355Keywords:
Algorithm, Analysis, Connection, Libraries, Monitoring, Network, Ports, Processes, Scanning, Services, Traffic, Threads, Visual Studio, WindowsAbstract
In this paper a modified network port scanner for Windows based operating systems implementing a linear algorithm is developed.
References
Bravo, C., Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure. Packt Publishing, ISBN-10 1800208162, ISBN-13 978-1800208162, 2022, p. 528.
Bryant, T., PTFM: Purple Team Field Manual. Independently published, ISBN-13 979-8682974061, 2020, p. 215.
Calderon, P., Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips, 3rd Edition, Packt Publishing, ISBN-10 1838649352, ISBN-13 978-1838649357, 2021, p. 436.
Candel, J., Mastering Python for Networking and Security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues, 2nd Edition. Packt Publishing, ISBN-10 1839217162, ISBN-13 978-1839217166, 2021, p. 538.
Candel, J., Sarker, M., Washington, S., Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition. Packt Publishing, ASIN B07Q4SDBGZ, 2019, p. 492.
Candel, J., Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues. Packt Publishing, ISBN-10 1788992512, ISBN-13 978-1788992510, 2018, p. 426.
Candel, J., Hacking ético con herramientas Python (Colecciones ABG - Informática y Computación) (Spanish Edition). American Book Group, ISBN-10 168165699X, ISBN-13 978-1681656991, 2020, p. 290.
Codings, Z., Ethical Hacking: A Beginner’s Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment. Independently published, ISBN-10 1694041565, ISBN-13 978-1694041562, 2019, p. 140.
Cole, E., Advanced persistent threat: understanding the danger and how to protect your organization, Syngress, 2013, ISBN: 978-1-59749-949-1, p. 309.
Diogenes, Y., Ozkaya, E., Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition. Packt Publishing, ISBN-10 183882779X, ISBN-13 978-1838827793, 2019, p. 634.
El-Hajj W., Aloul F., Trabelsi Z., Zaki N., On detecting port scanning using fuzzy based intrusion detection system, IEEE Wireless Communications and Mobile Computing Conference, 2008, IWCMC'08, ISBN: 978-1-4244-2201-2, pp. 105–110.
Elghaly, Y., Learn Penetration Testing with Python 3.x: Perform Offensive Pentesting and Prepare Red Teaming to Prevent Network Attacks and Web Vulnerabilities (English Edition). BPB Publications, ISBN-10 9390684919, ISBN-13 978-9390684915, 2021, p. 344.
Friedman, J., Hoffman, D. V., Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses, Information, Knowledge, Systems Management 7, №. 1, 2008, pp. 159–180.
Friedman, A., Singer, P., Cybersecurity and Cyberwar: what everyone needs to know. Oxford University Press, UK, 2014, ISBN 978-0-19-991809-6, p. 320.
Genov, B., Nedelchev, D., Mihovski, M., Mirchev, Y., Comprehensive approach for service life assessment of solid-propellant rocket motors. International Journal "NDT Days", Volume II, Issue 4, 2019, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 467-475.
Genov, B., NDT Assessment Model for Missile Motors. International Journal "NDT Days", Volume I, Issue 4, 2018, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 484-493.
Genov, B., Criteria for Selection of NDT in the Ammunition Life Cycle. International Journal "NDT Days", Volume I, Issue 4, 2018, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 494-503.
Genov, B., Kirkov, D., Mihovski, M., Mirchev, Y., Ageing of Solid Rocket Propellants Investigated by Ultrasound Technique. International Journal "NDT Days", Volume I, Issue 5, 2018, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 577-582.
Grubb, S., How Cybersecurity Really Works: A Hands-On Guide for Total Beginners. No Starch Press, ISBN-10 1718501285, ISBN-13 978-1718501287, 2021, p. 216.
Hadnagy, Ch., Social Engineering: The Science of Human Hacking 2nd Edition. Wiley, ISBN-10 111943338X, ISBN-13 978-1119433385, 2018, p. 320.
Iliev, R., K. Ignatova. Implementation of cloud technologies for building data centers in defence and security. Information & Security: An International Journal 43, No. 1. 2019, ISSN 0861-5160, pp. 89-97., https://doi.org/10.11610/isij.4308.
Iliev, R., K. Ignatova. Cloud technologies for building data center system for defense and security. T. Tagarev et al. (eds.), Digital Transformation, Cyber Security and Resilience of Modern Societies, Studies in Big Data 84, , ISBN 978-3-030-65721-5, Springer 2020, pp. 13-24, https://doi.org/10.1007/978-3-030-65722-2.
Kaur, R., Singh, G. Analysing, Port Scanning Tools and Security Techniques, International Journal of Electrical Electronics & Computer Science Engineering, Volume 1, Issue 5, October 2014, ISSN 2348 2273, pp. 58–64.
Lyon, G., F., Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, Nmap Project, ISBN-13: 978-0979958717, 2009, p. 464.
Orebaugh, A., Pinkard, B., Nmap in the Enterprise: Your Guide to Network Scanning, Syngress Publishing, ISBN 13: 978-1-59749-241-6, 2008, p. 259.
Orebaugh, A., Ramirez, G., Beale J., Wright J., Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security), Syngress, ISBN-13: 978-1597490733, 2007, p. 448.
Pavlova. D., Gindev, P. Designing an intelligent system for knowledge and process management in a university information environment. INTED2020 Proceedings. 14th International Technology, Education and Development Conference, Valencia, Spain, 2nd-4th March 2020, pp. 2743-2747. ISBN: 978-84-09-17939-8 doi: 10.21125/inted.2020.0818.
Pavlova, D., Dzhelepov, V., Gindev, P., Effectiveness of information security in computer systems for object and process management. 13th International traveling seminar, Modern dimensions in European education and research area. Bulgarian-Austrian cultural dialogue, 26-31 May 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 241-249. ISSN 2367-7988.
Pavlova, D., Gindev, P., System synthesis approach for intelligent knowledge management. 13th International traveling seminar, Modern dimensions in European education and research area. Bulgarian-Austrian cultural dialogue, 26-31 May 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 250-257. ISSN 2367-7988.
Pavlova, D., Gindev, P., A System for Intelligent Electronic Management of Knowledge and Business Processes in a University Information Environment. Proceedings of Seventh National Seminar with international participation - Intellectual property and digital people, 24 April 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 221-234. ISBN 978-619-185-379-3.
Radoeva, N., Iliev, R., A measurement process model implemented by generalized net. IEEE 8th International Conference on Intelligent Systems (IS), September 3-6, 2016, pp. 574-578, ISBN:978-1-5090-1355-5, DOI: 10.1109/IS.2016.7737482.
Sanders, Ch., Practical Packet Analysis, 2nd Edition, No Starch Press, San Francisco, USA, ISBN: 978-1-59327-266-1, 2011, p. 280.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 JOURNAL SCIENTIFIC AND APPLIED RESEARCH
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.