Shinde Mohit Ramdas, Gaikwad Shrikant Subhash, Talekar Tejas Uttam, Prof.Khatal K. B.
Network security assessment is a critical process for identifying vulnerabilities within computer systems and connected devices. Port scanning and network mapping are widely used techniques to discover open ports, active hosts, and running services in a network. Although several advanced tools such as Nmap are available, they are often complex and not user-friendly for beginners. This paper presents the design and implementation of a Custom Port Scanner and Network Mapping Tool developed using Python. The proposed system allows users to scan IP addresses and domains to detect open, closed, and filtered ports while identifying connected devices within the network. The tool integrates scanning techniques with a graphical user interface to visualize scan progress and results clearly. Experimental evaluation demonstrates that the developed tool provides accurate detection with efficient performance. The proposed system simplifies network security assessment and serves as an educational platform for cybersecurity learners and professionals.
1. G. Lyon, “Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning,” Insecure.org, 2020.
2. R. Kumar and S. Verma, “Design and implementation of a Python-based port scanning tool for network security,” International Journal of Computer Networks and Communications, vol. 13, no. 2, pp. 45–52, 2021.
3. A. Sharma, P. Singh, and R. Patel, “Lightweight network scanning framework for small-scale networks,” International Journal of Advanced Computer Science and Applications, vol. 12, no. 5, pp. 312–319, 2021.
4. M. Singh and K. Mehta, “Performance optimization of port scanning using multithreading techniques,” Procedia Computer Science, vol. 195, pp. 456–463, 2022.
5. S. Rao and V. Kulkarni, “Integrated vulnerability assessment using automated port scanning tools,” Journal of Network and Computer Applications, vol. 190, Article ID 103147, 2021.
6. L. Chen and H. Zhang, “Real-time network monitoring and host discovery for cybersecurity applications,” IEEE Access, vol. 10, pp. 88512–88524, 2022.
7. B. Forouzan, “Data Communications and Networking,” 5th ed., McGraw-Hill Education, 2019.
8. A. Tanenbaum and D. Wetherall, “Computer Networks,” 5th ed., Pearson Education, 2021.
9. Python Software Foundation, “Python Socket Programming Documentation,” Python.org, [Online]. Available: https://docs.python.org/3/library/socket.html, Accessed: 2025.
10. M. Mitnick and R. Simon, “Network Security Fundamentals and Scanning Techniques,” Cybersecurity Journal, vol. 8, no. 4, pp. 210–225, 2022.
11. S. Northcutt and J. Novak, “Network Intrusion Detection: An Analyst’s Handbook,” New Riders Publishing, 2018.
12. K. Scarfone and P. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS),” NIST Special Publication 800-94, 2019.
10.62226/ijarst20262614
PAGES : 1801-1804 | 6 VIEWS | 3 DOWNLOADS
Shinde Mohit Ramdas, Gaikwad Shrikant Subhash, Talekar Tejas Uttam, Prof.Khatal K. B. | Custom Port Scanner and Network Mapping Tool | DOI : 10.62226/ijarst20262614
| Journal Frequency: | ISSN 2320-1126, Monthly | |
| Paper Submission: | Throughout the month | |
| Acceptance Notification: | Within 6 days | |
| Subject Areas: | Engineering, Science & Technology | |
| Publishing Model: | Open Access | |
| Publication Fee: | USD 60 USD 50 | |
| Publication Impact Factor: | 6.76 | |
| Certificate Delivery: | Digital |