Detection of operating system vulnerabilities and network traffic analysis methods
Researchers and experts on information protection develop antivirus programs and applications to improve the security of operating systems and security policies. Threats will be relevant to organizations that do not consider security policies and regular software updates. This paper discusses applic...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Al-farabi Kazakh State National University
2024
|
Online Access: | http://psasir.upm.edu.my/id/eprint/113401/1/113401.pdf |
_version_ | 1817927919417163776 |
---|---|
author | Makulova, A. Sharipova, B. Othman, M. Pyrkova, A. Оrdabayeva, G. |
author_facet | Makulova, A. Sharipova, B. Othman, M. Pyrkova, A. Оrdabayeva, G. |
author_sort | Makulova, A. |
collection | UPM |
description | Researchers and experts on information protection develop antivirus programs and applications to improve the security of operating systems and security policies. Threats will be relevant to organizations that do not consider security policies and regular software updates. This paper discusses applications for scanning and analysing network traffic, such as Net discover, Wireshark, and Nmap. The model network is based on a virtual machine. This research aims to determine methods for scanning and analysing network traffic and detecting network vulnerabilities. This study conducted a penetration test for Windows 10 using the Kali Purple operating system and identified the vulnerability of the operating system. The calculation of network traffic is performed with (1) the determination of the arithmetic means of network traffic, (2) the calculation of the variance, and (3) the determination of the magnitude of fluctuations relative to the average M, the range of maximum and minimum values of D, and the Hurst coefficient. As a result of the conducted research on students enrolled in the educational program 6B06301 – Information Security Systems at Farabi University, the proficiency in MS Excel and C# skills amounted to 77.11%. The research results can be used in the field of information security systems. |
first_indexed | 2024-12-09T02:26:05Z |
format | Article |
id | upm.eprints-113401 |
institution | Universiti Putra Malaysia |
language | English |
last_indexed | 2024-12-09T02:26:05Z |
publishDate | 2024 |
publisher | Al-farabi Kazakh State National University |
record_format | dspace |
spelling | upm.eprints-1134012024-11-22T07:56:05Z http://psasir.upm.edu.my/id/eprint/113401/ Detection of operating system vulnerabilities and network traffic analysis methods Makulova, A. Sharipova, B. Othman, M. Pyrkova, A. Оrdabayeva, G. Researchers and experts on information protection develop antivirus programs and applications to improve the security of operating systems and security policies. Threats will be relevant to organizations that do not consider security policies and regular software updates. This paper discusses applications for scanning and analysing network traffic, such as Net discover, Wireshark, and Nmap. The model network is based on a virtual machine. This research aims to determine methods for scanning and analysing network traffic and detecting network vulnerabilities. This study conducted a penetration test for Windows 10 using the Kali Purple operating system and identified the vulnerability of the operating system. The calculation of network traffic is performed with (1) the determination of the arithmetic means of network traffic, (2) the calculation of the variance, and (3) the determination of the magnitude of fluctuations relative to the average M, the range of maximum and minimum values of D, and the Hurst coefficient. As a result of the conducted research on students enrolled in the educational program 6B06301 – Information Security Systems at Farabi University, the proficiency in MS Excel and C# skills amounted to 77.11%. The research results can be used in the field of information security systems. Al-farabi Kazakh State National University 2024 Article PeerReviewed text en cc_by_nc_4 http://psasir.upm.edu.my/id/eprint/113401/1/113401.pdf Makulova, A. and Sharipova, B. and Othman, M. and Pyrkova, A. and Оrdabayeva, G. (2024) Detection of operating system vulnerabilities and network traffic analysis methods. KazNU Bulletin. Mathematics, Mechanics, Computer Science Series, 121 (1). pp. 99-109. ISSN 1563-0277; eISSN: 2617-4871 https://bm.kaznu.kz/index.php/kaznu/article/view/1386 10.26577/JMMCS2024121110 |
spellingShingle | Makulova, A. Sharipova, B. Othman, M. Pyrkova, A. Оrdabayeva, G. Detection of operating system vulnerabilities and network traffic analysis methods |
title | Detection of operating system vulnerabilities and network traffic analysis methods |
title_full | Detection of operating system vulnerabilities and network traffic analysis methods |
title_fullStr | Detection of operating system vulnerabilities and network traffic analysis methods |
title_full_unstemmed | Detection of operating system vulnerabilities and network traffic analysis methods |
title_short | Detection of operating system vulnerabilities and network traffic analysis methods |
title_sort | detection of operating system vulnerabilities and network traffic analysis methods |
url | http://psasir.upm.edu.my/id/eprint/113401/1/113401.pdf |
work_keys_str_mv | AT makulovaa detectionofoperatingsystemvulnerabilitiesandnetworktrafficanalysismethods AT sharipovab detectionofoperatingsystemvulnerabilitiesandnetworktrafficanalysismethods AT othmanm detectionofoperatingsystemvulnerabilitiesandnetworktrafficanalysismethods AT pyrkovaa detectionofoperatingsystemvulnerabilitiesandnetworktrafficanalysismethods AT ordabayevag detectionofoperatingsystemvulnerabilitiesandnetworktrafficanalysismethods |