USING MODIFIED SNIFFER SCRIPTS, IMPLEMENTING LINEAR ALGORITHMS FOR DETECTION OF NETWORK PORT SCAN ATTACKS IN LINUX BASED OPERATING SYSTEMS

USING MODIFIED SNIFFER SCRIPTS, IMPLEMENTING LINEAR ALGORITHMS FOR DETECTION OF NETWORK PORT SCAN ATTACKS IN LINUX BASED OPERATING SYSTEMS

Authors

  • Petar Boyanov Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

DOI:

https://doi.org/10.46687/jsar.v24i1.371

Keywords:

Analysis, Connection, Linux, Modified script, Monitoring, Ports, Python3, Scanning, Security, Sniffer, Traffic

Abstract

In this scientific paper modified sniffer scripts, implementing linear algorithms for detection of network port scan attacks in Linux based operating systems are presented.

Author Biography

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

ORCID iD icon https://orcid.org/0000-0003-3668-6713

References

Arkamburge, Python Quick Basics and Advacnced programming Guide for Dummies and beginners on coding in computer science design using tricks with javascipt along learning to network and hack quickly: Guide 2 code. Independently published, ISBN-13 2021, 979-8768745837, p. 193.

Arnodlz, J., Python for Hackers and Pentesters full guides: you’ll explore the darker side of Python’s capabilities - writing network sniffers, stealing email ... fuzzers, infecting virtual machines.... Independently published,

ISBN-13 2021, 979-8712511532, p. 185.

Asrodia, Pallavi, and Hemlata Patel. "Network traffic analysis using packet sniffer." International journal of engineering research and applications 2, no. 3 (2012): 854-856.

Ballmann, B., Understanding Network Hacks: Attack and Defense with Python 3 2nd ed. Springer, ISBN-10 3662621592, ISBN-13 978-3662621592, 2022, p. 236.

Ballmann, B., Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python 3 (German Edition). Springer, ISBN-10 3662616351, ISBN-13, 2020, 978-3662616352, p. 237.

Barth, A., Caballero, J., & Song, D. (2009, May). Secure content sniffing for web browsers, or how to stop papers from reviewing themselves. In 2009 30th IEEE Symposium on Security and Privacy (pp. 360-371). IEEE.

Boyanov, P., Implementation of modified script for Linux based operating systems using a linear algorithm for network port scanning. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University

Press, Vol. 23, Shumen, 2022, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 48-59, DOI: https://doi.org/10.46687/jsar.v23i1.353.

Boyanov, P., A comprehensive scanning for open, closed and filtered ports in the computer systems and networks. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 23,

Shumen, 2022, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 85-98, DOI: https://doi.org/10.46687/jsar.v23i1.356.

Candel, J., Mastering Python for Networking and Security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues, 2nd Edition. Packt Publishing, ISBN-101839217162, ISBN-13 2021, 978-1839217166, p. 538.

Candel, J., Sarker, M., Washington, S., Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible, 2nd Edition. Packt Publishing, ASIN B07Q4SDBGZ, 2019, p. 492.

Candel, J., Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues. Packt Publishing, ISBN-10 1788992512, ISBN-13 978-1788992510, 2018, p. 426.

Candel, J., Hacking ético con herramientas Python (Colecciones ABG - Informática y Computación) (Spanish Edition). American Book Group, ISBN-10 168165699X, ISBN-13 978-1681656991, 2020, p. 290.

Choi, B., Introduction to Python Network Automation: The First Journey 1st ed. Edition. Apress, ISBN-101484268059, ISBN-13 978-1484268056, 2021, p. 896.

Chou, E., Kennedy, M., Whaley, M., Mastering Python Networking: Your one-stop solution to using Python for network automation, programmability, and DevOps, 3rd Edition. Packt Publishing, ISBN-101839214678, ISBN-13 2020, 978-1839214677, p. 576.

Codings, Z., Python Machine Learning: A Beginner’s Guide to Python Programming for Machine Learning and Deep Learning, Data Analysis, Algorithms and Data Science With Scikit Learn, TensorFlow, PyTorch and

Keras. Independently published, ISBN-10 1696563119, ISBN-13 978-1696563116, 2019, p. 147.

Codings, Z., Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity Fundamentals. Independently published, ISBN-10 1671532902, ISBN-13 978-1671532908, 2019, p. 408.

David, M., Mastering Python Network Programming: learn Network programming in simple and easy steps using Python as a programming language. Independently published, ISBN-13 2021, 979-8758780589, p.103.

Elghaly, Y., Learn Penetration Testing with Python 3.x: Perform Offensive Pentesting and Prepare Red Teaming to Prevent Network Attacks and Web JOURNAL SCIENTIFIC AND APPLIED RESEARCH Vol. 24, 2023 87

Vulnerabilities (English Edition). BPB Publications, ISBN-10 9390684919, ISBN-13 2021, 978-9390684915, p. 344.

Iliev, R., K. Ignatova. Cloud technologies for building data center system for defense and security. T. Tagarev et al. (eds.), Digital Transformation, Cyber Security and Resilience of Modern Societies, Studies in Big Data 84, ISBN 978-3-030-65721-5, Springer 2020, pp. 13-24,https://doi.org/10.1007/978-3-030-65722-2.

Kulshrestha, A., & Dubey, S. K. (2014). A literature reviewon sniffing attacks in computernetwork. International Journal of Advanced Engineering Research and Science (IJAERS), 1(2).

Malek, M. S. A., & Amran, A. R. (2021). A Study of Packet Sniffing as an Imperative Security Solution in Cybersecurity. Journal of Engineering Technology, 9(1), 96-101.

Oluwabukola, O., Oludele, A., Ogbonna, A. C., Chigozirim, A., & Amarachi, A. (2013, July). A Packet Sniffer (PSniffer) application for network security in Java. In Proceedings of the Informing Science and

Information Technology Education Conference (pp. 389-400). Informing Science Institute.

Pavlova, D., Dzhelepov, V., Gindev, P., Effectiveness of information security in computer systems for object and process management. 13th International traveling seminar, Modern dimensions in European education and research area. Bulgarian-Austrian cultural dialogue, 26-31 May 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 241-249. ISSN 2367-7988.

Qadeer, M. A., Iqbal, A., Zahid, M., & Siddiqui, M. R. (2010, February). Network traffic analysis and intrusion detection using packet sniffer. In 2010 Second International Conference on Communication Software and

Networks (pp. 313-317). IEEE.

Thakur, B. S., & Chaudhary, S. (2013). Content sniffing attack detection in client and server side: A survey. International Journal of Advanced Computer Research, 3(2), 7.

Downloads

Published

23.11.2023

How to Cite

Boyanov, P. (2023). USING MODIFIED SNIFFER SCRIPTS, IMPLEMENTING LINEAR ALGORITHMS FOR DETECTION OF NETWORK PORT SCAN ATTACKS IN LINUX BASED OPERATING SYSTEMS: USING MODIFIED SNIFFER SCRIPTS, IMPLEMENTING LINEAR ALGORITHMS FOR DETECTION OF NETWORK PORT SCAN ATTACKS IN LINUX BASED OPERATING SYSTEMS. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 24(1), 78–88. https://doi.org/10.46687/jsar.v24i1.371

Issue

Section

Communication and computer technologies

Categories

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 > >>