Mechanisms of system penetration: Review

Hesham Sakr, Magda I. El-Afifi
{"title":"Mechanisms of system penetration: Review","authors":"Hesham Sakr, Magda I. El-Afifi","doi":"10.21608/njccs.2023.248409.1024","DOIUrl":null,"url":null,"abstract":"Given the escalating frequency of cyber-attacks worldwide, network security has become a pressing concern. Consequently, a substantial amount of \"ethical hackers\" have offered their services voluntarily to develop strategies and scripts to combat security problems. The necessity for more efficient management of security systems has led to the development of penetration testing, as it is time-consuming to maintain and monitor attacks on each hardware and software within an enterprise. Several research organisations have developed algorithms to protect networks based on their size, kind, and purpose. This study involves the construction of a simulated organisational framework to examine the practise of penetration testing within a live server-client environment. The Border Gateway Protocol (BGP) was selected as the routing protocol due to its extensive usage in contemporary networks. In addition, BGP exhibits low internal vulnerabilities, which enhances the overall security assessment. This research introduces computer-based attacks and actual network-based attacks, together with their corresponding defence methods. The article demonstrates the process of conducting penetration testing on a specific BGP network. Both internal and external network attacks are used to produce packets, exploits, and payloads. Firstly, we commence by delineating all the sub-fields within the penetration testing domain, together with its respective requirements and repercussions. This paper focuses on several techniques used to attack routers, switches, and physical client workstations in the context of educational and learning research.","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"14 8","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Nile Journal of Communication and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/njccs.2023.248409.1024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Given the escalating frequency of cyber-attacks worldwide, network security has become a pressing concern. Consequently, a substantial amount of "ethical hackers" have offered their services voluntarily to develop strategies and scripts to combat security problems. The necessity for more efficient management of security systems has led to the development of penetration testing, as it is time-consuming to maintain and monitor attacks on each hardware and software within an enterprise. Several research organisations have developed algorithms to protect networks based on their size, kind, and purpose. This study involves the construction of a simulated organisational framework to examine the practise of penetration testing within a live server-client environment. The Border Gateway Protocol (BGP) was selected as the routing protocol due to its extensive usage in contemporary networks. In addition, BGP exhibits low internal vulnerabilities, which enhances the overall security assessment. This research introduces computer-based attacks and actual network-based attacks, together with their corresponding defence methods. The article demonstrates the process of conducting penetration testing on a specific BGP network. Both internal and external network attacks are used to produce packets, exploits, and payloads. Firstly, we commence by delineating all the sub-fields within the penetration testing domain, together with its respective requirements and repercussions. This paper focuses on several techniques used to attack routers, switches, and physical client workstations in the context of educational and learning research.
系统渗透机制:回顾
鉴于全球范围内的网络攻击日益频繁,网络安全已成为一个亟待解决的问题。因此,大量 "道德黑客 "自愿提供服务,开发应对安全问题的策略和脚本。由于维护和监控对企业内部每个硬件和软件的攻击非常耗时,因此,提高安全系统管理效率的必要性推动了渗透测试的发展。一些研究机构已根据网络的规模、种类和用途开发出保护网络的算法。本研究涉及构建一个模拟组织框架,以检验在实时服务器-客户端环境中进行渗透测试的实践。由于边界网关协议(BGP)在现代网络中的广泛应用,因此被选为路由协议。此外,BGP 的内部漏洞较少,这增强了整体安全性评估。本研究介绍了基于计算机的攻击和基于网络的实际攻击,以及相应的防御方法。文章演示了对特定 BGP 网络进行渗透测试的过程。内部和外部网络攻击都被用来产生数据包、漏洞和有效载荷。首先,我们划分了渗透测试领域内的所有子领域,以及各自的要求和影响。本文重点介绍在教育和学习研究中用于攻击路由器、交换机和物理客户端工作站的几种技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信