Volume 15, Issue 2

Custom Port Scanner and Network Mapping Tool

Author

Shinde Mohit Ramdas, Gaikwad Shrikant Subhash, Talekar Tejas Uttam, Prof.Khatal K. B.

Abstract

Network security assessment is a critical process for identifying vulnerabilities within computer systems and connected devices. Port scanning and network mapping are widely used techniques to discover open ports, active hosts, and running services in a network. Although several advanced tools such as Nmap are available, they are often complex and not user-friendly for beginners. This paper presents the design and implementation of a Custom Port Scanner and Network Mapping Tool developed using Python. The proposed system allows users to scan IP addresses and domains to detect open, closed, and filtered ports while identifying connected devices within the network. The tool integrates scanning techniques with a graphical user interface to visualize scan progress and results clearly. Experimental evaluation demonstrates that the developed tool provides accurate detection with efficient performance. The proposed system simplifies network security assessment and serves as an educational platform for cybersecurity learners and professionals.

Reference:

1.    G. Lyon, “Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning,” Insecure.org, 2020.
2.    R. Kumar and S. Verma, “Design and implementation of a Python-based port scanning tool for network security,” International Journal of Computer Networks and Communications, vol. 13, no. 2, pp. 45–52, 2021.
3.    A. Sharma, P. Singh, and R. Patel, “Lightweight network scanning framework for small-scale networks,” International Journal of Advanced Computer Science and Applications, vol. 12, no. 5, pp. 312–319, 2021.
4.    M. Singh and K. Mehta, “Performance optimization of port scanning using multithreading techniques,” Procedia Computer Science, vol. 195, pp. 456–463, 2022.
5.    S. Rao and V. Kulkarni, “Integrated vulnerability assessment using automated port scanning tools,” Journal of Network and Computer Applications, vol. 190, Article ID 103147, 2021.
6.    L. Chen and H. Zhang, “Real-time network monitoring and host discovery for cybersecurity applications,” IEEE Access, vol. 10, pp. 88512–88524, 2022.
7.    B. Forouzan, “Data Communications and Networking,” 5th ed., McGraw-Hill Education, 2019.
8.    A. Tanenbaum and D. Wetherall, “Computer Networks,” 5th ed., Pearson Education, 2021.
9.    Python Software Foundation, “Python Socket Programming Documentation,” Python.org, [Online]. Available: https://docs.python.org/3/library/socket.html, Accessed: 2025.
10.    M. Mitnick and R. Simon, “Network Security Fundamentals and Scanning Techniques,” Cybersecurity Journal, vol. 8, no. 4, pp. 210–225, 2022.
11.    S. Northcutt and J. Novak, “Network Intrusion Detection: An Analyst’s Handbook,” New Riders Publishing, 2018.
12.    K. Scarfone and P. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS),” NIST Special Publication 800-94, 2019.

DOI

10.62226/ijarst20262614

PAGES : 1801-1804 | 6 VIEWS | 3 DOWNLOADS


Download Full Article

Shinde Mohit Ramdas, Gaikwad Shrikant Subhash, Talekar Tejas Uttam, Prof.Khatal K. B. | Custom Port Scanner and Network Mapping Tool | DOI : 10.62226/ijarst20262614

Journal Frequency: ISSN 2320-1126, Monthly
Paper Submission: Throughout the month
Acceptance Notification: Within 6 days
Subject Areas: Engineering, Science & Technology
Publishing Model: Open Access
Publication Fee: USD 60  USD 50
Publication Impact Factor: 6.76
Certificate Delivery: Digital

Publish your research with IJARST and engage with global scientific minds