TARMOQDAGI ZARARLI TRAFIK TURLARI VA ULARNI ANIQLASH

Authors

  • Sh.R G‘ulomov Muhammad al-Xorazmiy nomidagi TATU, PhD, dotsent.

Keywords:

Tarmoq trafigi, zararli trafik, signaturali tahlil, mashinali o‘qitish, korelyatsiya, IDS, Antivirus, Honeypot.

Abstract

Ushbu maqolada tarmoqdagi zararli trafiklarga oid asosiy tushunchalari va tarmoq trafigida ularni aniqlash sxemalari keltirilgan. Korporativ tarmoqning ichki segmentida zararli trafik manbalari tasniflangan. Bundan tashqari tarmoq trafigidagi zararli tarfikni aniqlashning statik, signaturali, xatti-harakatlarni tahlil qilish, mashinali o‘qitish va korelatsiya tahlili usullari yoritib berilgan.

References

Отчет компании Check Point Software Technologies «Cyber Security Report 2022». — 80 с.

Monowar, H. B. Network Traffic Anomaly Detection and Prevention. Concepts, Techniques, and Tools / Monovar H. Bhuyan, Dhruba. K. Bhattacharyya, Jugal K. Kalita // Springer International Publishing, 2017. —285 p.

Monowar, H. B. Network Anomaly Detection: Methods, Systems and Tools / Monovar H. Bhuyan, Dhruba. K. Bhattacharyya, Jugal K. Kalita // IEEE Communication Surveys & Tutorials, Vol. 16, No. 1, 2014. —pp. 303–336

Татарникова Т. М. Статистические методы исследования сетевого трафика. Информационно-управляющие системы, 2018, № 5, с. 35–43.

Шаньгин, В. Ф. Информационная безопасность компьютерных систем и сетей / В. Ф. Шаньгин — М.: ИД «Форум»: ИНФРА-М, 2011. — 416 с.

Monowar, H. B. Network Traffic Anomaly Detection and Prevention. Concepts, Techniques, and Tools / Monovar H. Bhuyan, Dhruba. K. Bhattacharyya, Jugal K. Kalita // Springer International Publishing, 2017. — 285 p.

Бабенко Герман Валерьевич, Белов Сергей Валерьевич. Анализ поведенческих характеристик трафика Ethernet-TCP/IP на основе сигнатурного метода. Научно-практический журнал. ISSN 1995-5731, Информационная безопасность регионов. 2011. № 2 (9), -C.7-12

Miad Faezipour, Mehrdad Nourani, Sateesh Addepalli. A Behavioral Analysis Engine for Network Traffic. IEEE CCNC 2010 proceedings,

pp.1-5

M.R. Amal, P. Venkadesh. Review of Cyber Attack Detection: Honeypot System. Webology, Volume 19, Number 1, January, 2022, pp. 5497- 5514

Abdul Muin Nasution, Muhammad Zarlis, Suherman Suherman. Analysis and Implementation of Honeyd as a Low-Interaction Honeypot in Enhancing Security Systems. Randwick International of Social Science (RISS) Journal Vol. 2, No.1, January 2021| Page: 124-135

A. Umamaheswari and B. Kalaavathi, “Honeypot TB-IDS: trace back model based intrusion detection system using knowledge based honeypot construction model,” Cluster Comput., vol. 4, pp. 1–8, 2018.

Li, H. Research on intelligent intrusion prevention system based on snort / H. Li, D. Liu // In Proceedings of the 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE),

V.-1,— IEEE. 2010. — pp. 251–253.

Downloads

Published

2023-12-30

How to Cite

G‘ulomov , S. (2023). TARMOQDAGI ZARARLI TRAFIK TURLARI VA ULARNI ANIQLASH. Innovative Development in Educational Activities, 2(24), 424–432. Retrieved from https://openidea.uz/index.php/idea/article/view/1999