RESEARCH OF THE POSSIBILITIES OF THE C# PROGRAMMING LANGUAGE FOR CREATING CYBERSECURITY ANALYSIS SOFTWARE IN COMPUTER NETWORKS AND COMPUTER-INTEGRATED SYSTEMS
Main Article Content
Abstract
The object of research in the article are the tools and capabilities of the C# programming language for the implementation of cybersecurity analysis software in local computer networks and computer-integrated systems. The relevance of the study is due to the importance of information security of computer and computer-integrated systems in government, military-industrial complex, private business etc., and due to the importance of training cybersecurity professionals in higher education to consider teaching examples in popular programming languages. The goal of the work is to research the possibilities of the C# programming language for the development of software that analyzes cybersecurity in local computer networks and computer-integrated systems. The tasks to be solved are: to develop software for scanning network device ports in computer networks and computer-integrated systems for information security audit, using tools and libraries of the C# programming language, to research the benefits and possibilities of using this programming language for this task. Research methods: theory of computer networks, object-oriented programming, theory of algorithms and data structures, theory of software testing. Conclusions. In this paper the possibilities and advantages of the C# programming language for developing cybersecurity analysis software for computer and computer-integrated systems were explored. In the course of work software that analyzes information security in local computer networks and computer-integrated systems was developed. This software can be used for educational purposes in learning the C# programming language and cybersecurity of computer systems. The developed software has the potential to be further improved and applied in various fields to test the cybersecurity of local computer networks and computer-integrated technologies.
Article Details
References
Shirey R. (2000), “RFC 2828 Internet Security Glossary”, Internet Engineering Task Force, available at: https://datatracker.ietf.org/doc/html/rfc2828.
Poddubnyi V., Sievierinov О., Pustomelnik О. (2020), “Vulnerability management as an integral part of its security policy”, Control, Navigation and Communication Systems. Academic Journal, Vol. 4 (62), Poltava, pp. 55-58, DOI: https://doi.org/10.26906/SUNZ.2020.4.055 (in Ukrainian)
Mohammed M. O. (2020), “Automatic Port Scanner”, Int.ernational Journal of Innovative Science and Research Technology, Vol. 5(9), pp. 711-717, DOI: https://doi.org/10.38124/IJISRT20SEP503.
Verma S., Kawamoto Y., Kato N. (2021) “A Smart Internet-wide Port Scan Approach for Improving IoT Security under Dynamic WLAN Environments”, in IEEE Internet of Things Journal, DOI: https://doi.org/10.1109/JIOT.2021.3132389.
Verma S., Kawamoto Y., Kato N. (2021) “A Network-Aware Internet-Wide Scan for Security Maximization of IPv6-Enabled WLAN IoT Devices”, in IEEE Internet of Things Journal, Vol. 8, No. 10, pp. 8411-8422, DOI: https://doi.org/10.1109/JIOT.2020.3045733.
Markowsky L., Markowsky G. (2015) “Scanning for vulnerable devices in the Internet of Things”, 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp. 463-467, DOI: https://doi.org/10.1109/IDAACS.2015.7340779.
Bastos D., Shackleton M., El-Moussa F. (2018), “Internet of Things: A Survey of Technologies and Security Risks in Smart Home and City Environments”, Living in the Internet of Things: Cybersecurity of the IoT – 2018, DOI: https://doi.org/10.1049/cp.2018.0030.
Microsoft (2022), “C# documentation”, Official website Microsoft Corporation, available at: https://docs.microsoft.com/en-us/dotnet/csharp.