TARMOQ TRAFIGIDA SHUBHALI PAKETLARNI ANIQLASH ALGORITMI VA STRUKTURASI

Authors

  • Sh.R G‘ulomov Muhammad al-Xorazmiy nomidagi Toshkent axborot texnologiyalari universiteti Kiberxavfsizlik fakulteti dekani, PhD, dotsent.

Keywords:

Paketlar, qora yo‘yxat, oq ro‘yxat, tarmoq traffigi, MAC, IP, fishing, URL, DNS.

Abstract

Ushbu maqolada tarmoq trafigini filtirlash orqali shubhali paketlarni aniqlash algoritmi ishlab chiqilgan. IP manzillarining oq va qora ro‘yxatlarining umumlashtirilgan sxemasi keltirilgan. Taklif qilinyotgan fishing hujumlarini aniqlash algoritmining blok sxemasi qanday vazifalarni bajarishi va  qanday natijaga olib kelishi keltirilgan. Tadqiqot natijalariga koʻra Fishingni aniqlash algoritmi qaror qabul qilish uchun giperhavolalar xususiyatlarini tahlil qiladi. Taklif etilgan algoritm va struktura qurilgan bosqichlarni amalga oshirish hisobida giperhavola funksiyalaridan foydalanib veb-sahifaning qonuniyligini tekshirish imkon beradi.

References

M. Snehi and A. Bhandari, “Vulnerability retrospection of security solutions for software-defined cyber-physical system against DDoS and IoT-DDoS attacks,” Comput. Sci. Rev., vol. 40, 2021, Art. no. 100371.

G‘ulomov Sh.R. Veb-hujumlardan trafikni veb-filtrlash arxitekturasi. Multidisciplinary Scientific Journal. September, 2023, 229-239 стр.

K. Chen et al., “SDNShield: NFV-based defense framework against DdoS attacks on SDN control plane,” IEEE/ACM Trans. Netw., vol. 30, no. 1, pp. 1–17, Feb. 2022.

Gulomov Sherzod Rajaboevich, Mirzaeva Malika Bakhadirovna, Iminov Abdurasul Abdulatipovich. Port-Knocking Method for Enhancing Network Security. 2022 International Conference on Information Science and Communications Technologies (ICISCT) | 978-1-6654-7229-6/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICISCT55600.2022.10146918

R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, S. Garg, and M. M. Hassan, “A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network,” J. Parallel Distrib. Comput., vol. 164, pp. 55–68, 2022.

Gulomov Sherzod Rajaboevich, Abdurakhmonov Abduaziz Abdugafforovich, Azizova Zarina Ildarovna. Development a Model of a Network Attack Detection in Information and Communication Systems. Journal of Advances in Information Technology Vol. 13, No. 4, August 2022 (Scopus indexed), P: 312-319

J. Gardiner, A. Eiffert, P. Garraghan, N. J. P. Race, S. Nagaraja, and A. Rashid, “Controller-in-the-middle: Attacks on software defined networks in industrial control systems,” in Proc. 2th Workshop CPSIoT Secur. Privacy, 2021, pp. 63–68.

Гуломов Ш.Р., Насруллаев Н.Б., Абдурахмонов А.А., Азизова З.И. Оценка и применение алгоритмов машинного обучения для систем обнаружения и предотварешение вторжений. Муҳаммад ал-Хоразмий авлодлари илмий-амалий ва ахборот-таҳлилий журнал. № 4 (14), декабр 2020 й. Б.21-27

V. Tolpegin, S. Truex, M. E. Gursoy, and L. Liu, “Data poisoning attacks against federated learning systems,” in Proc. Eur. Symp. Res. Comput. Secur., 2020, pp. 480–501.

Downloads

Published

2023-11-30

How to Cite

G‘ulomov , S. (2023). TARMOQ TRAFIGIDA SHUBHALI PAKETLARNI ANIQLASH ALGORITMI VA STRUKTURASI. Innovative Development in Educational Activities, 2(22), 37–43. Retrieved from https://openidea.uz/index.php/idea/article/view/1809