USING MODIFIED SNIFFER SCRIPTS, IMPLEMENTING LINEAR ALGORITHMS FOR DETECTION OF NETWORK PORT SCAN ATTACKS IN LINUX BASED OPERATING SYSTEMS
USING MODIFIED SNIFFER SCRIPTS, IMPLEMENTING LINEAR ALGORITHMS FOR DETECTION OF NETWORK PORT SCAN ATTACKS IN LINUX BASED OPERATING SYSTEMS
DOI:
https://doi.org/10.46687/jsar.v24i1.371Keywords:
Analysis, Connection, Linux, Modified script, Monitoring, Ports, Python3, Scanning, Security, Sniffer, TrafficAbstract
In this scientific paper modified sniffer scripts, implementing linear algorithms for detection of network port scan attacks in Linux based operating systems are presented.
References
Arkamburge, Python Quick Basics and Advacnced programming Guide for Dummies and beginners on coding in computer science design using tricks with javascipt along learning to network and hack quickly: Guide 2 code. Independently published, ISBN-13 2021, 979-8768745837, p. 193.
Arnodlz, J., Python for Hackers and Pentesters full guides: you’ll explore the darker side of Python’s capabilities - writing network sniffers, stealing email ... fuzzers, infecting virtual machines.... Independently published,
ISBN-13 2021, 979-8712511532, p. 185.
Asrodia, Pallavi, and Hemlata Patel. "Network traffic analysis using packet sniffer." International journal of engineering research and applications 2, no. 3 (2012): 854-856.
Ballmann, B., Understanding Network Hacks: Attack and Defense with Python 3 2nd ed. Springer, ISBN-10 3662621592, ISBN-13 978-3662621592, 2022, p. 236.
Ballmann, B., Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python 3 (German Edition). Springer, ISBN-10 3662616351, ISBN-13, 2020, 978-3662616352, p. 237.
Barth, A., Caballero, J., & Song, D. (2009, May). Secure content sniffing for web browsers, or how to stop papers from reviewing themselves. In 2009 30th IEEE Symposium on Security and Privacy (pp. 360-371). IEEE.
Boyanov, P., Implementation of modified script for Linux based operating systems using a linear algorithm for network port scanning. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University
Press, Vol. 23, Shumen, 2022, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 48-59, DOI: https://doi.org/10.46687/jsar.v23i1.353.
Boyanov, P., A comprehensive scanning for open, closed and filtered ports in the computer systems and networks. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 23,
Shumen, 2022, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 85-98, DOI: https://doi.org/10.46687/jsar.v23i1.356.
Candel, J., Mastering Python for Networking and Security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues, 2nd Edition. Packt Publishing, ISBN-101839217162, ISBN-13 2021, 978-1839217166, p. 538.
Candel, J., Sarker, M., Washington, S., Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible, 2nd Edition. Packt Publishing, ASIN B07Q4SDBGZ, 2019, p. 492.
Candel, J., Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues. Packt Publishing, ISBN-10 1788992512, ISBN-13 978-1788992510, 2018, p. 426.
Candel, J., Hacking ético con herramientas Python (Colecciones ABG - Informática y Computación) (Spanish Edition). American Book Group, ISBN-10 168165699X, ISBN-13 978-1681656991, 2020, p. 290.
Choi, B., Introduction to Python Network Automation: The First Journey 1st ed. Edition. Apress, ISBN-101484268059, ISBN-13 978-1484268056, 2021, p. 896.
Chou, E., Kennedy, M., Whaley, M., Mastering Python Networking: Your one-stop solution to using Python for network automation, programmability, and DevOps, 3rd Edition. Packt Publishing, ISBN-101839214678, ISBN-13 2020, 978-1839214677, p. 576.
Codings, Z., Python Machine Learning: A Beginner’s Guide to Python Programming for Machine Learning and Deep Learning, Data Analysis, Algorithms and Data Science With Scikit Learn, TensorFlow, PyTorch and
Keras. Independently published, ISBN-10 1696563119, ISBN-13 978-1696563116, 2019, p. 147.
Codings, Z., Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity Fundamentals. Independently published, ISBN-10 1671532902, ISBN-13 978-1671532908, 2019, p. 408.
David, M., Mastering Python Network Programming: learn Network programming in simple and easy steps using Python as a programming language. Independently published, ISBN-13 2021, 979-8758780589, p.103.
Elghaly, Y., Learn Penetration Testing with Python 3.x: Perform Offensive Pentesting and Prepare Red Teaming to Prevent Network Attacks and Web JOURNAL SCIENTIFIC AND APPLIED RESEARCH Vol. 24, 2023 87
Vulnerabilities (English Edition). BPB Publications, ISBN-10 9390684919, ISBN-13 2021, 978-9390684915, p. 344.
Iliev, R., K. Ignatova. Cloud technologies for building data center system for defense and security. T. Tagarev et al. (eds.), Digital Transformation, Cyber Security and Resilience of Modern Societies, Studies in Big Data 84, ISBN 978-3-030-65721-5, Springer 2020, pp. 13-24,https://doi.org/10.1007/978-3-030-65722-2.
Kulshrestha, A., & Dubey, S. K. (2014). A literature reviewon sniffing attacks in computernetwork. International Journal of Advanced Engineering Research and Science (IJAERS), 1(2).
Malek, M. S. A., & Amran, A. R. (2021). A Study of Packet Sniffing as an Imperative Security Solution in Cybersecurity. Journal of Engineering Technology, 9(1), 96-101.
Oluwabukola, O., Oludele, A., Ogbonna, A. C., Chigozirim, A., & Amarachi, A. (2013, July). A Packet Sniffer (PSniffer) application for network security in Java. In Proceedings of the Informing Science and
Information Technology Education Conference (pp. 389-400). Informing Science Institute.
Pavlova, D., Dzhelepov, V., Gindev, P., Effectiveness of information security in computer systems for object and process management. 13th International traveling seminar, Modern dimensions in European education and research area. Bulgarian-Austrian cultural dialogue, 26-31 May 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 241-249. ISSN 2367-7988.
Qadeer, M. A., Iqbal, A., Zahid, M., & Siddiqui, M. R. (2010, February). Network traffic analysis and intrusion detection using packet sniffer. In 2010 Second International Conference on Communication Software and
Networks (pp. 313-317). IEEE.
Thakur, B. S., & Chaudhary, S. (2013). Content sniffing attack detection in client and server side: A survey. International Journal of Advanced Computer Research, 3(2), 7.
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2023 JOURNAL SCIENTIFIC AND APPLIED RESEARCH
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.