remah

logo

European Development  And Research Academy (EDARA)

     Enhance Penetration Testing Techniques to Improve Cybersecurity with NetLogo, Nmap, and Wireshark

    Written by Huthaifa Mohammed Kanoosh, Ammar Farooq Abbas,Mohammed Muayad
    (0 votes)
    Share:
    Share:

     Enhance Penetration Testing Techniques to Improve Cybersecurity with NetLogo, Nmap, and Wireshark
    Huthaifa Mohammed Kanoosh1 Mohammed Muayad Sultan2 Ammar Farooq Abbas3
    1,3 Department of Computer Science, College of Computer Science and Mathematics, Tikrit University, Tikrit, Iraq.
    2 Mathematics Department, Tikrit University, College of Education of Girls, Tikrit University, Tikrit, Iraq.
    1E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it., 2 E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it., 3 E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

     

    Abstract
    This study will try to address the complex network security dimensions using a multidimensional approach involving a NetLogo simulation, Nmap scanning, and Wireshark analysis. The NetLogo simulation model ensures an accurate insight into the dynamics of penetration testing and defense strategies of networks thereby allowing a better understanding of interactions amongst different elements in the network and how they affect security from practice (defensive and offensive) to comprehensive security. Information provided by Nmap scanning is used for hosts and services on the network in detail these aid in identifying and assessing potential vulnerabilities as well as enhancement of security strategies. Wireshark analysis focuses on packet transfer behaviors, describing ways communication patterns are identified as well as how to detect suspicious activities: and possible intrusions. At its core, findings accentuate network security as complex, digital assets needing protection through robust defense mechanisms.
    Keywords: Cybersecurity, Ethical hacking, network security, NetLogo, Nmap, and Wireshark.

     

     

    Download Paper

    Download Cover

    Read 1 times