Security Testing With Python Scripts


  • Frida ZISKO Department of Information Business, Mediterranean University of Albania
  • Alma HYRA Department of Information Technology, Mediterranean University of Albania



network traffic, NetworkX, malicious device


Cyber security is one of the main issues that is discussed today everywhere in the world. The development of technology has grown rapidly and it is important that this development should be done simultaneously with the increase in security. When we talk about the network, we must also consider its "Security". On the other hand, Python is a language which, especially in recent times, has received a great development and now we can say that it enjoys such a wide community. Our goal in this article is the advantages that this programming language offers in cases of cyber security issues. It has everything that cyber security professionals need to protect against cyber vulnerabilities and threats. It allows developers to do anything that relates to cyber security by detecting threats to system fixes. Python is a high-level, general-purpose, interpreted programming language for analyzing small networks. So, the implications of the study are for cybersecurity professionals and developers. They use the NetworkX grid tools imported into python. NetworkX provides many functions and generation facilities to read and write graphics in many formats. By analyzing these network nodes graphs, are identified the nodes that can be "bad". With Python scripts, you can scan ports and compromised device. In order to achieve this, we have obtained two concrete dataset which were obtained respectively from a public and a private network. After analyzing the graphs, the weaknesses of the network and unidentified devices in the network are identified, creating the possibility of taking appropriate measures to protect against cyber-attacks.







How to Cite

“Security Testing With Python Scripts”, SCRD, vol. 7, no. 2, pp. 77–84, Jun. 2023, doi: 10.25019/m4c99y31.

Similar Articles

1-10 of 16

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)