Analysis of cyber-attacks through simulation


  • Fatmir Basholli
  • Dolantina Hyka
  • Albina Basholli
  • Adisa Daberdini
  • Besjana Mema


Simulation, Technology, Institutions, Cyber systems


Nowadays, the development of information technology has brought radical changes in every aspect of people's lives and this has made our lives have a lot of access to information. Users should be very careful when using social networks, various applications and navigating the Internet world because the risk of cyber-attacks by irresponsible persons with malicious intentions is very frequent. This paper aims to provide the necessary information for cyber-attacks, where we will use for simulation tools from the MetaSploit library which is a framework that makes hacking simpler and is also an essential tool for many attackers and defender.


Rahalkar, S. (2017). Metasploit for Beginners. UK.

Basholli, F., (2022). Cyber warfare, a new aspect of modern warfare. International Scientific Journal Security & Future, Publisher: Scientific Technical Union of Mechanical Engineering Industry-4.0, 72-75

Malware, 2019.

Johnson, M., (2021). The Role of Education in Cybersecurity: A Systematic Literature Review. International Journal of Cybersecurity Education, Research and Practice.

Basholli, F., Daberdin─░, A., & Basholli, A. (2023). Detection and prevention of intrusions into computer systems. Advanced Engineering Days (AED), 6, 138-141.

Denial-of-service attack, (2019).

Hyka, D., & Basholli, F. (2023). Health care cyber security: Albania case study. Advanced Engineering Days (AED), 6, 121-123.

Phishing, (2019)

Smith, J., Johnson, A., & Brown, L. (2022). The Role of Education in Cyber Hygiene: A Systematic Review. International Journal of Cybersecurity Education, Research, and Practice

Daberdini, A., Basholli, F., Metaj, N., & Skenderaj, E. (2022). Cyber security in mail with Fortiweb and Fortinet for companies and institutions. Advanced Engineering Days (AED), 5, 81-83.