IMPLEMENTATION OF TCP SYN FLOOD CYBER ATTACK IN THE COMPUTER NETWORK AND SYSTEMS

IMPLEMENTATION OF TCP SYN FLOOD CYBER ATTACK IN THE COMPUTER NETWORK AND SYSTEMS

Authors

  • Petar Boyanov DEPARTMENT OF MANAGEMENT OF SECURITY SYSTEMS, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712,115, UNIVERSITETSKA STR.

DOI:

https://doi.org/10.46687/jsar.v17i1.270

Keywords:

DDOS, Education, Exploit, Flood, Information resources, LAN, Scanner, Security, SYN, Vulnerability, Windows 7, Windows 8

Abstract

In this paper implementation of SYN Flood cyber attack in the computer network and systems is performed.

Author Biography

Petar Boyanov, DEPARTMENT OF MANAGEMENT OF SECURITY SYSTEMS, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712,115, UNIVERSITETSKA STR.

DEPARTMENT OF MANAGEMENT OF SECURITY SYSTEMS, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712,115, UNIVERSITETSKA STR.

ORCID iD icon https://orcid.org/0000-0003-3668-6713

References

Bhattacharyya, D., Alisherov, F. Penetration testing for hire. International Journal of Advanced Science and Technology, 2009, vol. 8, pp. 1-8.

Fox, E., Bush, J., Ashley, S., Webb, I. Common Hacking Tools for Linux and Windows, 2002, CS 581 Semester Project, pp. 1-17.

Marquez, J. An Analysis of the IDS Penetration Tool: Metasploit. The InfoSec Writers Text Library, 2010, pp. 1-6.

Moore, H. D. Metasploitation. In CanSecWest Security Conference, 2006, pp. 1-28.

Shrestha, N. Security Assessment via Penetration Testing: Network and System Administrator's Approach: Security, Network and System Administrator, Penetration Testing, Master's thesis, 2012, pp. 1-98.

Hristov, H., Scanning for vulnerabilities in the security mechanisms of the hosts in the academic institutions and government agencies, Mathematical and Software Engineering, ISSN 2367-7449, Vol. 4, No. 1, 2018, pp. 1-6.

Linko Nikolov, Krasimir Slavyanov, „On the contemporary cybersecurity threats“, I st CONFSEC 2017, 11-14.12.2017, Borovets, ISSN Print: 2603-2945, ISSN Online: 2603-2953, стр. 142-144; url: http://confsec.eu/sbornik/2-2017.pdf.

Nikolov G. L., Fetfov M. O., Borisova R. A., Security concerns in javascript coding, МАТТЕХ 2018, Volume 2, part 2, Conference proceeding, v. 2, pp. 27 – 31, Section Communication and Computer Technologies, ISSN: 1314-3921.

Nikolov G. L., Wireless network vulnerabilities estimation, International Scientific Journal “Security & Future”, Vol. 2 (2018), Issue 2, pg(s) 80-82; WEB ISSN 2535-082X; Print ISSN 2535-0668.

Nikolov, L., Slavyanov, V., Network infrastructure for cybersecurity analysis. International scientific conference 2018, “Vasil Levski” National Military University - Artillery, Air Defense and CIS Faculty, Shumen, Bulgaria, 2018, ISSN 2367-7902.

Nikolov, L., Slavyanov, Kr., On the contemporary cybersecurity threats, Security & Future,Vol. 1 (2017), Issue 3, ISSN 2535-0668, pp.111-113.

Tsankov, Ts., Denev D. R., Use in Internet of Protocols Transport Layer Security and its now-deprecated predecessor Secure Sockets Layer. Annual of Konstantin Preslavski University of Shumen, Vol. VIII E, 2018.

Parashkevanova, G., Tsankov, Ts., Cybercrime as the main contemporary threat to large organizations, Conference proceedings Mattex 2016, ISSN 1314-3921.

Savov, I., Edin pogled varhu sashtnostta na kiberprestapleniyata, spisanie „Politika i sigurnost”,VUSI, 2017, ISSN 2535-0358, s. 36-47.

Savov, I., The collision of national Security and Privacy in the age of information technologies, European Police Science and Research Bulletin, European Union Agency for Law Enforcement Training, 2017, ISSN 2443-7883, p. 13-21.

Tasheva N. Zh., Bogdanov A. R., Anonymous communication system in cyberspace using tor protocol, Proceedings of Scientific Conference 2014 - Defense Technologies,Faculty of Artillery, Air Defense and Communication and Information Systems, 2014, ISBN 978-954-9681-49-9, pp. 259-265.

Downloads

Published

21.03.2023

How to Cite

Boyanov, P. (2023). IMPLEMENTATION OF TCP SYN FLOOD CYBER ATTACK IN THE COMPUTER NETWORK AND SYSTEMS: IMPLEMENTATION OF TCP SYN FLOOD CYBER ATTACK IN THE COMPUTER NETWORK AND SYSTEMS. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 17(1), 36–42. https://doi.org/10.46687/jsar.v17i1.270

Most read articles by the same author(s)

<< < 1 2 3 4 5 6 7 8 9 > >>