Implementation of the denial of service (dos) cyber attack against the information resources of national government agencies and academic institutions

Authors

  • Ilin Savov Higher School of Security and Economics
  • Petar Boyanov Шуменски университет „Епископ Константин Преславски“

DOI:

https://doi.org/10.5281/zenodo.5660866

Abstract

In this paper an implementation of the Denial of Service (DoS) cyber attack Against the National Cyber Security System is made.

Downloads

Download data is not yet available.

References

Боянов, П. Кибератаки и противодействие. Монография. Шумен: Епископ Константин Преславски, 2017. ISBN 978-619-201-206-9.

Савов, И. Относно някои аспекти от процедурите по използване на трафичните данни в Република България и някои европейски страни. – В: Международна конференция „Противодействие на радикализацията и тероризма“, Академия на МВР, април 2017 г. ISBN 978-954-348-145-3.

Савов, И. Един поглед върху същността на киберпрестъпленията. – В: Политика и сигурност, ВУСИ, 2017. ISSN 2535-0358.

Досев, Н., Г. Томов. Кибертероризъм и противодействие. Учебник за дистанционно обучение. Велико Търново: Национален военен университет „Васил Левски“, 2014. ISBN 978-954-753-207-6.

Allen, L. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Birmingham, UK: Packt Publishing, 2012. ISBN 978-1-84951-774-4.

Bodmer, S., M. Kilger, Gr. Carpenter, J. Jones. Reverse Deception: Organized Cyber Threat Counter-Exploitation. McGraw-Hill Education, 2012. ISBN 978-0-07-177250-1.

Boyanov, P. Educational exploiting the information resources and invading the security mechanisms of the operating system Windows 7 with the exploit Eternalblue and Backdoor Doublepulsar. – In: Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 14, 2018. ISSN 1314-

[online]. http://www.rst-tto.com/publication.html.

Hristov, H. Scanning for vulnerabilities in the security mechanisms of the hosts in the academic institutions and government agencies. – In: Mathematical and Software Engineering, Vol. 4, No. 1, 2018. ISSN 2367-7449. [online]. http://varepsilon.com/.

Hristov, Hr. Development of warfare and counter-terrorism. – In: Science Education Innovation, Vol. 3, 2014. ISSN 1314-9784.

Hristov, Hr. A modern survey on problems of business organization’s security. – In: Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 7, 2015. ISSN 1314-6289. [online]. http://www.rst-tto.com/publication.html.

Kahya-Özyirmidokuz, E., A. Gezer, C. Ciflikli. Characterization of Network Traffic Data: A Data Preprocessing and Data Mining Application. – In: Data Analytics. The First International Conference on Data Analytics, September, 2012. ISBN 978-1-61208-242-4.

Kaur, R., G. Singh, Analysing, Port Scanning Tools and Security Techniques. – In: International Journal of Electrical Electronics & Computer Science Engineering, Vol. 1, Issue 5, October 2014. ISSN 2348 2273.

Meyers, C., S. Powers, D. Faissol. Probabilistic Characterization of Adversary Behavior in Cyber Security. No. LLNL-TR-419023. – In: Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2009.

Meyers, C., S. Powers, D. Faissol. Taxonomies of cyber adversaries and attacks: a survey of incidents and approaches. – In: Lawrence Livermore National Laboratory, Livermore, CA, April 2009, Vol. 7.

Nachev, A., S. Zhelezov. Assessing the efficiency of information protection systems in the computer systems and networks. – In: Information Technology and Security, No. 1(3), 2013.

Oram, A., J. Viega. Beautiful Security. – In: O’Reilly Media, 2009. ISBN 978-0-596-52748-8.

Shimeall, T. J., J. M. Spring. Introduction to Information Security: A Strategic-Based Approach. Syngress, 2014. ISBN: 978-1-59749-969-9.

Simmons, C., S. Shiva, D. Dasgupta, Q. Wu. AVOIDIT: A cyber attack taxonomy. University of Memphis. – In: Proceedings of the 9th Annual Symposium on Information Assurance (ASIA ’14), Albany, NY, USA, June 3 – 4, 2014.

Downloads

Published

31-03-2019

Issue

Section

NATIONAL SECURITY AND PUBLIC ORDER

How to Cite

Implementation of the denial of service (dos) cyber attack against the information resources of national government agencies and academic institutions. (2019). Politics & Security, 3(1), 15-20. https://doi.org/10.5281/zenodo.5660866

Most read articles by the same author(s)