Emulation of the Attack Simulation Software Module to a Wireless Network

Authors

  • Aleksander V. Borisenko Putilin Belgorod Law Institute of the Ministry of Internal Affairs of the Russian Federation
  • Viktor L. Akapyev Putilin Belgorod Law Institute of the Ministry of Internal Affairs of the Russian Federation
  • Ekaterina G. Kovaleva Putilin Belgorod Law Institute of the Ministry of Internal Affairs of the Russian Federation
  • Ekaterina A. Novikova Putilin Belgorod Law Institute of the Ministry of Internal Affairs of the Russian Federation

DOI:

https://doi.org/10.52575/2687-0932-2025-52-4-873-886

Keywords:

cybercrime, simulation of an attack on a wireless network, simulator, emulation of a software module, handshake

Abstract

The relevance of the study is determined by the need to increase the effectiveness of countering cybercrime. The study attempts to emulate a simulator software module that imitates the process of penetration into a wireless Wi-Fi network applying principles of social engineering. Such a device may be indispensable to specialist training. To achieve this goal, it is necessary to solve the following tasks: launch the developed software module, select a software environment, and compile the software module. In the process of solving the formulated tasks, the authors analyzed the criminal situation in terms of cybercrime, employing general and private scientific methods of cognition (the dialectical method, analysis, synthesis, method of analogy, projection, forecasting, etc.), the main one being the method of modular design of the hardware and software complex. Based on the research findings, a simulator software module has been created. The study reveals the need to use such hardware and software complexes for training law enforcement officers.

Downloads

Download data is not yet available.

Author Biographies

Aleksander V. Borisenko, Putilin Belgorod Law Institute of the Ministry of Internal Affairs of the Russian Federation

Candidate of Physical and Mathematical Sciences, Lecturer at the Department of Information and Computer Technologies in the Activities of the Internal Affairs Directorate,  Belgorod, Russia
E-mail: borisenko02.94@mail.ru

Viktor L. Akapyev, Putilin Belgorod Law Institute of the Ministry of Internal Affairs of the Russian Federation

Candidate of Pedagogical Sciences, Associate Professor of the Department of Information and Computer Technologies in the Activities of the Internal Affairs Directorate, Belgorod, Russia

Ekaterina G. Kovaleva, Putilin Belgorod Law Institute of the Ministry of Internal Affairs of the Russian Federation

Candidate of Technical Sciences, Associate Professor of the Department of Information and Computer Technologies in the Activities of the Internal Affairs Directorate, Belgorod, Russia

Ekaterina A. Novikova, Putilin Belgorod Law Institute of the Ministry of Internal Affairs of the Russian Federation

Candidate of Law Sciences, Head of the Department of Information and Computer Technologies in the Activities of the Internal Affairs Directorate, Belgorod, Russia

References

Список литературы

Акапьев В.Л., Ковалева Е.А., Борисенко А.В., Панарин В.В. 2024. Разработка симулятора атаки на беспроводную сеть. Вестник Воронежского института ФСИН России, 3: 22–34.

Акапьев В.Л., Савотченко С.Е. 2015. Актуальные проблемы импортозамещения программного обеспечения образовательных организаций в контексте информационной безопасности. Дистанционное и виртуальное обучение, 11(101): 113–125.

В России за январь – июль 2025 года ущерб от IT-преступлений вырос на 16 % и составил почти 120 млрд рублей. – URL: https://alrf.ru/news/v-rossii-za-yanvar-iyul-2025-goda-ushcherb-ot-it-prestupleniy-vyros-na-16-i-sostavil-pochti-120-mlrd (дата обращения 07.09.2025).

Виртуальные тренажеры и эмуляторы. – URL: https://labstand.ru/catalog/virtualnye-trenazhery-i-emulyatory-zashhita-informaczii (дата обращения 28.09.2025).

Журавлева В.В., Ткаченко А.Л. 2023. Пентест и его особенности. Дневник науки, 11: 83.

Интерактивная карта киберугроз. – URL: https://cybermap.kaspersky.com/ru/stats#country=213&type= IDS&period=m (дата обращения 08.10.2025).

Abdalla A.S., Tang B., Marojevic V. 2025. AI at the Physical Layer for Wireless Network Security and Privacy. Artificial Intelligence for Future Networks, 341–380. DOI:10.1002/9781394227952.ch10

An Z., Pan J., Wen Y., Zhang F. 2023. Secret handshakes: Full dynamicity, deniability and lattice-based design. Theoretical Computer Science, 940(3): 14–35. DOI:10.1016/j.tcs.2022.10.035

Bodenhausen J., Mangel S., Vogt T., Henze M. 2025. Bidirectional TLS Handshake Caching for Constrained Industrial IoT Scenarios. 2025 IEEE 50th Conference on Local Computer Networks (LCN). 1–10.

Kumar K.D., Niranjan D.K., Reddy P.P., Himanshu P., Raju K.S., Goud P. 2025. CloudShare: A Passwordless Cloud-Based File Storage and Sharing Framework. In 2025 International Conference on Computing Technologies (ICOCT). 1–6.

Montañez-Juan M., Forteza-Domenici C., García-Buades M.E., Blahopoulou J., Ortiz-Bonnin S. 2025. Virtual handshakes: team emotional intelligence and digital competences in virtual settings. Behaviour & Information Technology, 44(14): 3501–3513. DOI:10.1080/0144929X.2025.2535740

Perez E.L., Selander G., Mattsson J.P., Watteyne T., Vučinić M. 2024. EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis. Computer, 57(9): 101–110.

Prayatno C., Tohari M., Susilowati T. 2024. The Impact of Using Technology and Innovation in Law Enforcement in the Era of Digitalization. Jurnal Ekonomi Teknologi dan Bisnis (JETBIS), 3(8): 1026–1033.

Ramadan R. 2022. Internet of things (iot) security vulnerabilities: A review. PLOMS AI, 2(1).

Saha K.K., Ray S., Dasgupta M. 2024. ECMHP: ECC-based secure handshake protocol for multicasting in CCN-IoT environment. IEEE Transactions on Network and Service Management, 21(5): 5826–5842.

Teichmann F.M., Boticiu S.R. 2023. An overview of the benefits, challenges, and legal aspects of penetration testing and red teaming. International Cybersecurity Law Review, 4(4): 387–397.

The 8 Best Virtual Cybersecurity Practice Labs – URL: https://www.cloudshare.com/blog/cybersecurity-practice-labs (access data: 01.10.2025).

Torres-Trujillo J., Meza-Alarcon A.J., Ticona W. 2024. Test and Pentesting Methods for Identifying Vulnerabilities in IoT Devices: A Systematic Review. Proceedings of the Computational Methods in Systems and Software, 28–41.

Yavorsky M.А., Useev R.Z., Kurushin S.A. 2021. Information technologies in law enforcement: Overview of implements and opportunities. European Proceedings of Social and Behavioural Sciences.

Zhukabayeva T., Karabayev N., Nurusheva A., Satybaldina D. 2024. A method of vulnerability analysis in wireless internet of things networks for smart city infrastructures. Scientific Journal of Astana IT University. Vol. 20. DOI:10.37943/20VPSX8675

References

Akap'ev V.L., Kovaleva E.A., Borisenko A.V., Panarin V.V. 2024. Razrabotka simuljatora ataki na besprovodnuju set' [Development of a Wireless Network Attack Simulator.] Vestnik Voronezhskogo instituta FSIN Rossii [Bulletin of the Voronezh Institute of the Federal Penitentiary Service of Russia], 3: 22–34.

Akap'ev V.L., Savotchenko S.E. 2015. Aktual'nye problemy importozameshhenija programmnogo obespechenija obrazovatel'nyh organizacij v kontekste informacionnoj bezopasnosti [Current Issues of Import Substitution of Educational Software in the Context of Information Security]. Distancionnoe i virtual'noe obuchenie [Distance and Virtual Learning],11(101): 113–125.

V Rossii za janvar'-ijul' 2025 goda ushherb ot IT-prestuplenij vyros na 16 % i sostavil pochti 120 mlrd rublej [In Russia, damage from IT crimes increased by 16 % from January to July 2025, amounting to almost 120 billion rubles]. URL: https://alrf.ru/news/v-rossii-za-yanvar-iyul-2025-goda-ushcherb-ot-it-prestupleniy-vyros-na-16-i-sostavil-pochti-120-mlrd (access data: 07.09.2025).

Virtual'nye trenazhery i jemuljatory [Virtual simulators and emulators]. URL: https://labstand.ru/catalog/virtualnye-trenazhery-i-emulyatory-zashhita-informaczii (access data: 28.09.2025).

Zhuravleva V.V., Tkachenko A.L. 2023. Pentest i ego osobennosti [Pentesting and its features] Dnevnik nauki [Science Diary], 11: 83.

Abdalla A.S., Tang B., Marojevic V. 2025. AI at the Physical Layer for Wireless Network Security and Privacy. Artificial Intelligence for Future Networks, 341–380. DOI:10.1002/9781394227952.ch10

An Z., Pan J., Wen Y., Zhang F. 2023. Secret handshakes: Full dynamicity, deniability and lattice-based design. Theoretical Computer Science, 940(3): 14–35. DOI: 10.1016/j.tcs.2022.10.035

Bodenhausen J., Mangel S., Vogt T., Henze M. 2025. Bidirectional TLS Handshake Caching for Constrained Industrial IoT Scenarios. 2025 IEEE 50th Conference on Local Computer Networks (LCN). 1–10.

Kumar K.D., Niranjan D.K., Reddy P.P., Himanshu P., Raju K.S., Goud P. 2025. CloudShare: A Passwordless Cloud-Based File Storage and Sharing Framework. In 2025 International Conference on Computing Technologies (ICOCT). 1–6.

Montañez-Juan M., Forteza-Domenici C., García-Buades M.E., Blahopoulou J., Ortiz-Bonnin S. 2025. Virtual handshakes: team emotional intelligence and digital competences in virtual settings. Behaviour & Information Technology, 44(14): 3501–3513. DOI:10.1080/0144929X.2025.2535740

Perez E.L., Selander G., Mattsson J.P., Watteyne T., Vučinić M. 2024. EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis. Computer, 57(9): 101–110.

Prayatno C., Tohari M., Susilowati T. 2024. The Impact of Using Technology and Innovation in Law Enforcement in the Era of Digitalization. Jurnal Ekonomi Teknologi dan Bisnis (JETBIS), 3(8): 1026–1033.

Ramadan R. 2022. Internet of things (iot) security vulnerabilities: A review. PLOMS AI, 2(1).

Saha K.K., Ray S., Dasgupta M. 2024. ECMHP: ECC-based secure handshake protocol for multicasting in CCN-IoT environment. IEEE Transactions on Network and Service Management, 21(5): 5826–5842.

Teichmann F.M., Boticiu S.R. 2023. An overview of the benefits, challenges, and legal aspects of penetration testing and red teaming. International Cybersecurity Law Review, 4(4): 387–397.

The 8 Best Virtual Cybersecurity Practice Labs – URL: https://www.cloudshare.com/blog/cybersecurity-practice-labs (access data: 01.10.2025).

Torres-Trujillo J., Meza-Alarcon A.J., Ticona W. 2024. Test and Pentesting Methods for Identifying Vulnerabilities in IoT Devices: A Systematic Review. Proceedings of the Computational Methods in Systems and Software, 28–41.

Yavorsky M.А., Useev R.Z., Kurushin S.A. 2021.Information technologies in law enforcement: Overview of implements and opportunities. European Proceedings of Social and Behavioural Sciences.

Zhukabayeva T., Karabayev N., Nurusheva A., Satybaldina D. 2024. A method of vulnerability analysis in wireless internet of things networks for smart city infrastructures. Scientific Journal of Astana IT University, Vol. 20. DOI:10.37943/20VPSX8675


Abstract views: 1

Share

Published

2025-12-30

How to Cite

Borisenko, A. V., Akapyev, V. L., Kovaleva, E. G., & Novikova, E. A. (2025). Emulation of the Attack Simulation Software Module to a Wireless Network. Economics. Information Technologies, 52(4), 873-886. https://doi.org/10.52575/2687-0932-2025-52-4-873-886

Issue

Section

COMPUTER SIMULATION HISTORY

Most read articles by the same author(s)