2024
DOI: 10.21822/2073-6185-2024-51-2-53-61
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of features of implementing a “Port scanning” attack using a “Zombie” computer

N. V. Boldyrikhin,
M. V. Karpenko,
I. A. Sosnovsky
et al.

Abstract: Objective. Analyze the implementation features of a “Port scanning” attack using a “Zombie” computer to hide the IP address of the attacking machine.Method. The method is based on computer simulation of a “port scanning” attack using a virtual infrastructure of the network.Result. Theoretical aspects related to the implementation of a “port scanning” attack using a “zombie” computer are analyzed. The parameters by which a “zombie” machine is selected on the network are indicated. A computer simulation of a “po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 10 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?