IMPLEMENTATION OF TCP SYN FLOOD CYBER ATTACK IN THE COMPUTER NETWORK AND SYSTEMS
IMPLEMENTATION OF TCP SYN FLOOD CYBER ATTACK IN THE COMPUTER NETWORK AND SYSTEMS
DOI:
https://doi.org/10.46687/jsar.v17i1.270Keywords:
DDOS, Education, Exploit, Flood, Information resources, LAN, Scanner, Security, SYN, Vulnerability, Windows 7, Windows 8Abstract
In this paper implementation of SYN Flood cyber attack in the computer network and systems is performed.
References
Bhattacharyya, D., Alisherov, F. Penetration testing for hire. International Journal of Advanced Science and Technology, 2009, vol. 8, pp. 1-8.
Fox, E., Bush, J., Ashley, S., Webb, I. Common Hacking Tools for Linux and Windows, 2002, CS 581 Semester Project, pp. 1-17.
Marquez, J. An Analysis of the IDS Penetration Tool: Metasploit. The InfoSec Writers Text Library, 2010, pp. 1-6.
Moore, H. D. Metasploitation. In CanSecWest Security Conference, 2006, pp. 1-28.
Shrestha, N. Security Assessment via Penetration Testing: Network and System Administrator's Approach: Security, Network and System Administrator, Penetration Testing, Master's thesis, 2012, pp. 1-98.
Hristov, H., Scanning for vulnerabilities in the security mechanisms of the hosts in the academic institutions and government agencies, Mathematical and Software Engineering, ISSN 2367-7449, Vol. 4, No. 1, 2018, pp. 1-6.
Linko Nikolov, Krasimir Slavyanov, „On the contemporary cybersecurity threats“, I st CONFSEC 2017, 11-14.12.2017, Borovets, ISSN Print: 2603-2945, ISSN Online: 2603-2953, стр. 142-144; url: http://confsec.eu/sbornik/2-2017.pdf.
Nikolov G. L., Fetfov M. O., Borisova R. A., Security concerns in javascript coding, МАТТЕХ 2018, Volume 2, part 2, Conference proceeding, v. 2, pp. 27 – 31, Section Communication and Computer Technologies, ISSN: 1314-3921.
Nikolov G. L., Wireless network vulnerabilities estimation, International Scientific Journal “Security & Future”, Vol. 2 (2018), Issue 2, pg(s) 80-82; WEB ISSN 2535-082X; Print ISSN 2535-0668.
Nikolov, L., Slavyanov, V., Network infrastructure for cybersecurity analysis. International scientific conference 2018, “Vasil Levski” National Military University - Artillery, Air Defense and CIS Faculty, Shumen, Bulgaria, 2018, ISSN 2367-7902.
Nikolov, L., Slavyanov, Kr., On the contemporary cybersecurity threats, Security & Future,Vol. 1 (2017), Issue 3, ISSN 2535-0668, pp.111-113.
Tsankov, Ts., Denev D. R., Use in Internet of Protocols Transport Layer Security and its now-deprecated predecessor Secure Sockets Layer. Annual of Konstantin Preslavski University of Shumen, Vol. VIII E, 2018.
Parashkevanova, G., Tsankov, Ts., Cybercrime as the main contemporary threat to large organizations, Conference proceedings Mattex 2016, ISSN 1314-3921.
Savov, I., Edin pogled varhu sashtnostta na kiberprestapleniyata, spisanie „Politika i sigurnost”,VUSI, 2017, ISSN 2535-0358, s. 36-47.
Savov, I., The collision of national Security and Privacy in the age of information technologies, European Police Science and Research Bulletin, European Union Agency for Law Enforcement Training, 2017, ISSN 2443-7883, p. 13-21.
Tasheva N. Zh., Bogdanov A. R., Anonymous communication system in cyberspace using tor protocol, Proceedings of Scientific Conference 2014 - Defense Technologies,Faculty of Artillery, Air Defense and Communication and Information Systems, 2014, ISBN 978-954-9681-49-9, pp. 259-265.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 JOURNAL SCIENTIFIC AND APPLIED RESEARCH
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.