Detection of operating system vulnerabilities and network traffic analysis methods

Researchers and experts on information protection develop antivirus programs and applications to improve the security of operating systems and security policies. Threats will be relevant to organizations that do not consider security policies and regular software updates. This paper discusses applic...

Full description

Bibliographic Details
Main Authors: Makulova, A., Sharipova, B., Othman, M., Pyrkova, A., Оrdabayeva, G.
Format: Article
Language:English
Published: Al-farabi Kazakh State National University 2024
Online Access:http://psasir.upm.edu.my/id/eprint/113401/1/113401.pdf
_version_ 1817927919417163776
author Makulova, A.
Sharipova, B.
Othman, M.
Pyrkova, A.
Оrdabayeva, G.
author_facet Makulova, A.
Sharipova, B.
Othman, M.
Pyrkova, A.
Оrdabayeva, G.
author_sort Makulova, A.
collection UPM
description Researchers and experts on information protection develop antivirus programs and applications to improve the security of operating systems and security policies. Threats will be relevant to organizations that do not consider security policies and regular software updates. This paper discusses applications for scanning and analysing network traffic, such as Net discover, Wireshark, and Nmap. The model network is based on a virtual machine. This research aims to determine methods for scanning and analysing network traffic and detecting network vulnerabilities. This study conducted a penetration test for Windows 10 using the Kali Purple operating system and identified the vulnerability of the operating system. The calculation of network traffic is performed with (1) the determination of the arithmetic means of network traffic, (2) the calculation of the variance, and (3) the determination of the magnitude of fluctuations relative to the average M, the range of maximum and minimum values of D, and the Hurst coefficient. As a result of the conducted research on students enrolled in the educational program 6B06301 – Information Security Systems at Farabi University, the proficiency in MS Excel and C# skills amounted to 77.11%. The research results can be used in the field of information security systems.
first_indexed 2024-12-09T02:26:05Z
format Article
id upm.eprints-113401
institution Universiti Putra Malaysia
language English
last_indexed 2024-12-09T02:26:05Z
publishDate 2024
publisher Al-farabi Kazakh State National University
record_format dspace
spelling upm.eprints-1134012024-11-22T07:56:05Z http://psasir.upm.edu.my/id/eprint/113401/ Detection of operating system vulnerabilities and network traffic analysis methods Makulova, A. Sharipova, B. Othman, M. Pyrkova, A. Оrdabayeva, G. Researchers and experts on information protection develop antivirus programs and applications to improve the security of operating systems and security policies. Threats will be relevant to organizations that do not consider security policies and regular software updates. This paper discusses applications for scanning and analysing network traffic, such as Net discover, Wireshark, and Nmap. The model network is based on a virtual machine. This research aims to determine methods for scanning and analysing network traffic and detecting network vulnerabilities. This study conducted a penetration test for Windows 10 using the Kali Purple operating system and identified the vulnerability of the operating system. The calculation of network traffic is performed with (1) the determination of the arithmetic means of network traffic, (2) the calculation of the variance, and (3) the determination of the magnitude of fluctuations relative to the average M, the range of maximum and minimum values of D, and the Hurst coefficient. As a result of the conducted research on students enrolled in the educational program 6B06301 – Information Security Systems at Farabi University, the proficiency in MS Excel and C# skills amounted to 77.11%. The research results can be used in the field of information security systems. Al-farabi Kazakh State National University 2024 Article PeerReviewed text en cc_by_nc_4 http://psasir.upm.edu.my/id/eprint/113401/1/113401.pdf Makulova, A. and Sharipova, B. and Othman, M. and Pyrkova, A. and Оrdabayeva, G. (2024) Detection of operating system vulnerabilities and network traffic analysis methods. KazNU Bulletin. Mathematics, Mechanics, Computer Science Series, 121 (1). pp. 99-109. ISSN 1563-0277; eISSN: 2617-4871 https://bm.kaznu.kz/index.php/kaznu/article/view/1386 10.26577/JMMCS2024121110
spellingShingle Makulova, A.
Sharipova, B.
Othman, M.
Pyrkova, A.
Оrdabayeva, G.
Detection of operating system vulnerabilities and network traffic analysis methods
title Detection of operating system vulnerabilities and network traffic analysis methods
title_full Detection of operating system vulnerabilities and network traffic analysis methods
title_fullStr Detection of operating system vulnerabilities and network traffic analysis methods
title_full_unstemmed Detection of operating system vulnerabilities and network traffic analysis methods
title_short Detection of operating system vulnerabilities and network traffic analysis methods
title_sort detection of operating system vulnerabilities and network traffic analysis methods
url http://psasir.upm.edu.my/id/eprint/113401/1/113401.pdf
work_keys_str_mv AT makulovaa detectionofoperatingsystemvulnerabilitiesandnetworktrafficanalysismethods
AT sharipovab detectionofoperatingsystemvulnerabilitiesandnetworktrafficanalysismethods
AT othmanm detectionofoperatingsystemvulnerabilitiesandnetworktrafficanalysismethods
AT pyrkovaa detectionofoperatingsystemvulnerabilitiesandnetworktrafficanalysismethods
AT ordabayevag detectionofoperatingsystemvulnerabilitiesandnetworktrafficanalysismethods