TARMOQ HUJUMLARI IZLARINI ANIQLASH MODELLARI VA ALGORITMLARI

Authors

  • G‘ulomov Sherzod Radjaboyevich Author
  • Ramazonova Madina Shavkatovna Author
  • Raxmanqulova Mashhura Ruziboyevna Author
  • Jalilov Muhammad Hasan og‘li Author

Keywords:

tarmoq xavfsizligi, IDS, IPS, tarmoq hujumlari, DDoS hujumi, Man-in-the-Middle hujumi, zararli dasturlar, sun’iy intellekt.

Abstract

Kiberxavfsizlik sohasida tarmoq hujumlarini erta aniqlash va oldini olish axborot texnologiyalarining muhim yo‘nalishlaridan biridir. Ushbu maqolada tarmoq hujumlarini aniqlash va ularning izlarini tahlil qilish usullari o‘rganiladi. Xususan, aktiv va passiv hujumlar, DoS/DDoS hujumlari, Man-in-the-Middle (MITM) hujumlari, zararli dasturlar (malware, ransomware, trojan), veb-hujumlar (SQL Injection, XSS, CSRF) va boshqa kiberxavfsizlik tahdidlari haqida batafsil ma’lumot beriladi.

References

1) Stallings, W. (2020). Network Security Essentials: Applications and Standards. Pearson Education.

2) Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.

3) Peng, T., Leckie, C., & Ramamohanarao, K. (2017). "Survey of network-based defense mechanisms countering the DoS and DDoS problems." ACM Computing Surveys, 39(1).

4) Conti, M., Dragoni, N., & Lesyk, V. (2016). "A survey of man in the middle attacks." IEEE Communications Surveys & Tutorials, 18(3), 2027-2051.

5) OWASP Foundation. (2023). OWASP Top 10 Security Risks. https://owasp.org/www-project-top-ten/

6) Amoroso, E. (2019). Cyber Attacks: Protecting National Infrastructure. Elsevier.

7) Scarfone, K., Mell, P. (2022). "Guide to Intrusion Detection and Prevention Systems (IDPS)." NIST Special Publication 800-94.

8) Splunk Inc. (2023). SIEM: Security Information and Event Management Overview. https://www.splunk.com/

9) ISO/IEC 27001. (2022). Information security management systems – Requirements. ISO Standards.

10) Shone, N., Ngoc, T., Phai, V. D., & Shi, Q. (2018). "A deep learning approach to network intrusion detection." IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41-50.

Downloads

Published

2025-06-30