A COMPREHENSIVE SCANNING FOR OPEN, CLOSED AND FILTERED PORTS IN THE COMPUTER SYSTEMS AND NETWORKS

A COMPREHENSIVE SCANNING FOR OPEN, CLOSED AND FILTERED PORTS IN THE COMPUTER SYSTEMS AND NETWORKS

Authors

  • Petar Boyanov Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

DOI:

https://doi.org/10.46687/jsar.v23i1.356

Keywords:

Connection, Linux, Monitoring, Network, Ports, Processes, Scanning, Services, Traffic, Threads, Windows

Abstract

In this paper a comprehensive scanning for open, closed and filtered ports in the computer systems and networks is made.

Author Biography

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

DEPARTMENT OF MANAGEMENT OF SECURITY SYSTEMS, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712,115, UNIVERSITETSKA STR.

ORCID iD icon https://orcid.org/0000-0003-3668-6713

References

Bravo, C., Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure. Packt Publishing, ISBN-10 1800208162, ISBN-13 978-1800208162, 2022, p. 528.

Bryant, T., PTFM: Purple Team Field Manual. Independently published, ISBN-13 ‏979-8682974061, 2020, p. 215.

Calderon, P., Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips, 3rd Edition, Packt Publishing, ISBN-10 ‏1838649352, ISBN-13 ‏978-1838649357, 2021, p. 436.

Candel, J., Mastering Python for Networking and Security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues, 2nd Edition. Packt Publishing, ISBN-10 ‏1839217162, ISBN-13 ‏978-1839217166, 2021, p. 538.

Candel, J., Sarker, M., Washington, S., Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition. Packt Publishing, ASIN ‏B07Q4SDBGZ, 2019, p. 492.

Candel, J., Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues. Packt Publishing, ISBN-10 1788992512, ISBN-13 978-1788992510, 2018, p. 426.

Candel, J., Hacking ético con herramientas Python (Colecciones ABG - Informática y Computación) (Spanish Edition). American Book Group, ISBN-10 168165699X, ISBN-13 978-1681656991, 2020, p. 290.

Codings, Z., Ethical Hacking: A Beginner’s Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment. Independently published, ISBN-10 ‏ 1694041565, ISBN-13 ‏978-1694041562, 2019, p. 140.

Cole, E., Advanced persistent threat: understanding the danger and how to protect your organization, Syngress, 2013, ISBN: 978-1-59749-949-1, p. 309.

Diogenes, Y., Ozkaya, E., Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition. Packt Publishing, ISBN-10 ‏183882779X, ISBN-13 ‏978-1838827793, 2019, p. 634.

El-Hajj W., Aloul F., Trabelsi Z., Zaki N., On detecting port scanning using fuzzy based intrusion detection system, IEEE Wireless Communications and Mobile Computing Conference, 2008, IWCMC'08, ISBN: 978-1-4244-2201-2, pp. 105–110.

Elghaly, Y., Learn Penetration Testing with Python 3.x: Perform Offensive Pentesting and Prepare Red Teaming to Prevent Network Attacks and Web Vulnerabilities (English Edition). BPB Publications, ISBN-10 9390684919, ISBN-13 ‏978-9390684915, 2021, p. 344.

Friedman, J., Hoffman, D. V., Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses, Information, Knowledge, Systems Management 7, №. 1, 2008, pp. 159–180.

Friedman, A., Singer, P., Cybersecurity and Cyberwar: what everyone needs to know. Oxford University Press, UK, 2014, ISBN 978-0-19-991809-6, p. 320.

Genov, B., Nedelchev, D., Mihovski, M., Mirchev, Y., Comprehensive approach for service life assessment of solid-propellant rocket motors. International Journal "NDT Days", Volume II, Issue 4, 2019, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 467-475.

Genov, B., NDT Assessment Model for Missile Motors. International Journal "NDT Days", Volume I, Issue 4, 2018, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 484-493.

Genov, B., Criteria for Selection of NDT in the Ammunition Life Cycle. International Journal "NDT Days", Volume I, Issue 4, 2018, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 494-503.

Genov, B., Kirkov, D., Mihovski, M., Mirchev, Y., Ageing of Solid Rocket Propellants Investigated by Ultrasound Technique. International Journal "NDT Days", Volume I, Issue 5, 2018, ISSN: 2603-4018 (print), 2603-4646 (online), pp. 577-582.

Grubb, S., How Cybersecurity Really Works: A Hands-On Guide for Total Beginners. No Starch Press, ISBN-10 ‏1718501285, ISBN-13 ‏978-1718501287, 2021, p. 216.

Hadnagy, Ch., Social Engineering: The Science of Human Hacking 2nd Edition. Wiley, ISBN-10 ‏111943338X, ISBN-13 ‏978-1119433385, 2018, p. 320.

Iliev, R., K. Ignatova. Implementation of cloud technologies for building data centers in defence and security. Information & Security: An International Journal 43, No. 1. 2019, ISSN 0861-5160, pp. 89-97., https://doi.org/10.11610/isij.4308.

Iliev, R., K. Ignatova. Cloud technologies for building data center system for defense and security. T. Tagarev et al. (eds.), Digital Transformation, Cyber Security and Resilience of Modern Societies, Studies in Big Data 84, , ISBN 978-3-030-65721-5, Springer 2020, pp. 13-24, https://doi.org/10.1007/978-3-030-65722-2.

Kaur, R., Singh, G. Analysing, Port Scanning Tools and Security Techniques, International Journal of Electrical Electronics & Computer Science Engineering, Volume 1, Issue 5, October 2014, ISSN 2348 2273, pp. 58–64.

Lyon, G., F., Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, Nmap Project, ISBN-13: 978-0979958717, 2009, p. 464.

Orebaugh, A., Pinkard, B., Nmap in the Enterprise: Your Guide to Network Scanning, Syngress Publishing, ISBN 13: 978-1-59749-241-6, 2008, p. 259.

Orebaugh, A., Ramirez, G., Beale J., Wright J., Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security), Syngress, ISBN-13: 978-1597490733, 2007, p. 448.

Pavlova. D., Gindev, P. Designing an intelligent system for knowledge and process management in a university information environment. INTED2020 Proceedings. 14th International Technology, Education and Development Conference, Valencia, Spain, 2nd-4th March 2020, pp. 2743-2747. ISBN: 978-84-09-17939-8 doi: 10.21125/inted.2020.0818.

Pavlova, D., Dzhelepov, V., Gindev, P., Effectiveness of information security in computer systems for object and process management. 13th International traveling seminar, Modern dimensions in European education and research area. Bulgarian-Austrian cultural dialogue, 26-31 May 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 241-249. ISSN 2367-7988.

Pavlova, D., Gindev, P., System synthesis approach for intelligent knowledge management. 13th International traveling seminar, Modern dimensions in European education and research area. Bulgarian-Austrian cultural dialogue, 26-31 May 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 250-257. ISSN 2367-7988.

Pavlova, D., Gindev, P., A System for Intelligent Electronic Management of Knowledge and Business Processes in a University Information Environment. Proceedings of Seventh National Seminar with international participation - Intellectual property and digital people, 24 April 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 221-234. ISBN 978-619-185-379-3.

Radoeva, N., Iliev, R., A measurement process model implemented by generalized net. IEEE 8th International Conference on Intelligent Systems (IS), September 3-6, 2016, pp. 574-578, ISBN:978-1-5090-1355-5, DOI: 10.1109/IS.2016.7737482.

Sanders, Ch., Practical Packet Analysis, 2nd Edition, No Starch Press, San Francisco, USA, ISBN: 978-1-59327-266-1, 2011, p. 280.

Downloads

Published

26.03.2023

How to Cite

Boyanov, P. (2023). A COMPREHENSIVE SCANNING FOR OPEN, CLOSED AND FILTERED PORTS IN THE COMPUTER SYSTEMS AND NETWORKS: A COMPREHENSIVE SCANNING FOR OPEN, CLOSED AND FILTERED PORTS IN THE COMPUTER SYSTEMS AND NETWORKS. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 23(1), 85–98. https://doi.org/10.46687/jsar.v23i1.356

Issue

Section

Communication and computer technologies

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 > >>