Implementation of the denial of service (dos) cyber attack against the information resources of national government agencies and academic institutions
DOI:
https://doi.org/10.5281/zenodo.5660866Abstract
In this paper an implementation of the Denial of Service (DoS) cyber attack Against the National Cyber Security System is made.
Downloads
References
Боянов, П. Кибератаки и противодействие. Монография. Шумен: Епископ Константин Преславски, 2017. ISBN 978-619-201-206-9.
Савов, И. Относно някои аспекти от процедурите по използване на трафичните данни в Република България и някои европейски страни. – В: Международна конференция „Противодействие на радикализацията и тероризма“, Академия на МВР, април 2017 г. ISBN 978-954-348-145-3.
Савов, И. Един поглед върху същността на киберпрестъпленията. – В: Политика и сигурност, ВУСИ, 2017. ISSN 2535-0358.
Досев, Н., Г. Томов. Кибертероризъм и противодействие. Учебник за дистанционно обучение. Велико Търново: Национален военен университет „Васил Левски“, 2014. ISBN 978-954-753-207-6.
Allen, L. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Birmingham, UK: Packt Publishing, 2012. ISBN 978-1-84951-774-4.
Bodmer, S., M. Kilger, Gr. Carpenter, J. Jones. Reverse Deception: Organized Cyber Threat Counter-Exploitation. McGraw-Hill Education, 2012. ISBN 978-0-07-177250-1.
Boyanov, P. Educational exploiting the information resources and invading the security mechanisms of the operating system Windows 7 with the exploit Eternalblue and Backdoor Doublepulsar. – In: Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 14, 2018. ISSN 1314-
[online]. http://www.rst-tto.com/publication.html.
Hristov, H. Scanning for vulnerabilities in the security mechanisms of the hosts in the academic institutions and government agencies. – In: Mathematical and Software Engineering, Vol. 4, No. 1, 2018. ISSN 2367-7449. [online]. http://varepsilon.com/.
Hristov, Hr. Development of warfare and counter-terrorism. – In: Science Education Innovation, Vol. 3, 2014. ISSN 1314-9784.
Hristov, Hr. A modern survey on problems of business organization’s security. – In: Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 7, 2015. ISSN 1314-6289. [online]. http://www.rst-tto.com/publication.html.
Kahya-Özyirmidokuz, E., A. Gezer, C. Ciflikli. Characterization of Network Traffic Data: A Data Preprocessing and Data Mining Application. – In: Data Analytics. The First International Conference on Data Analytics, September, 2012. ISBN 978-1-61208-242-4.
Kaur, R., G. Singh, Analysing, Port Scanning Tools and Security Techniques. – In: International Journal of Electrical Electronics & Computer Science Engineering, Vol. 1, Issue 5, October 2014. ISSN 2348 2273.
Meyers, C., S. Powers, D. Faissol. Probabilistic Characterization of Adversary Behavior in Cyber Security. No. LLNL-TR-419023. – In: Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2009.
Meyers, C., S. Powers, D. Faissol. Taxonomies of cyber adversaries and attacks: a survey of incidents and approaches. – In: Lawrence Livermore National Laboratory, Livermore, CA, April 2009, Vol. 7.
Nachev, A., S. Zhelezov. Assessing the efficiency of information protection systems in the computer systems and networks. – In: Information Technology and Security, No. 1(3), 2013.
Oram, A., J. Viega. Beautiful Security. – In: O’Reilly Media, 2009. ISBN 978-0-596-52748-8.
Shimeall, T. J., J. M. Spring. Introduction to Information Security: A Strategic-Based Approach. Syngress, 2014. ISBN: 978-1-59749-969-9.
Simmons, C., S. Shiva, D. Dasgupta, Q. Wu. AVOIDIT: A cyber attack taxonomy. University of Memphis. – In: Proceedings of the 9th Annual Symposium on Information Assurance (ASIA ’14), Albany, NY, USA, June 3 – 4, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) 2019 2019

This work is licensed under a Creative Commons Attribution 4.0 International License.

