ANALYSIS OF WEAKNESSES IN NETWORK PROTOCOLS AND SYSTEMS
Sarvar Norboboyevich Tashev , Shakhrisabz Branch of Tashkent Institute of Chemical Technology Address: 20 Shakhrisabz st.,181310, Shakhrisabz city, Republic of UzbekistanAbstract
This article details the importance of assessing the vulnerabilities of network protocols and systems and the steps required to implement them. The article emphasizes that the main goal of vulnerability research is the timely identification of information security problems and their elimination. At the same time, the dependence of the main indicators of network efficiency on the protocols used in it is also scientifically substantiated. Information security issues were analyzed by integrating metrics obtained from assessing the impact of attacks in various areas of network packets into network monitoring systems. The article also provides an in-depth analysis of the advantages and disadvantages of network protocols, and also examines each of them from the point of view of information security.
Keywords
Network protocols, vulnerability signatures, traffic filtering
References
Gulomov Sh.R. Tarmoqdagi zararli trafik turlari va ularni aniqlash. Multidisciplinary Scientific Journal. December, Issue 24 | 2023, -B.424-432 https://doi.org/10.5281/zenodo.10445437
SN Tashev, AG Ganiev The Role of “Imagination” in the Process of “Creative Thinking” Developing Students'“Imagination” and “Creative Thinking” Skills in Teaching Physics. Annals of the Romanian Society for Cell Biology, 2021/3/6, 633-642 DOI:10.17762/pae.v58i1.1309
SN Tashev THE ROLE OF “IMAGINATION” IN THE PROCESS OF “CREATIVE THINKING”, DEVELOPING STUDENTS’ “IMAGINATION” AND “CREATIVE THINKING” SKILLS IN TEACHING PHYSICS PSYCHOLOGY AND EDUCATION, 3569-3575 DOI:10.17762/pae.v58i1.1309 License CC BY 4.0
Y.B. Karamatovich, T.S. Norboboevich, N.I. Ibrohimovich. Verification of the pocket filtering based on method of verification on the model. 2019 International Conference on Information Science and Communications Technologies (ICISCT) DOI:10.1109/ICISCT47635.2019.9011901
J. Ning et al., “Pine: Enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment,” in Proc. Eur. Symp. Res. Comput. Secur., 2020, pp. 3–22 DOI:10.1007/978-3-030-58951-6_1
J. Kim, S. Camtepe, J. Baek, W. Susilo, J. Pieprzyk, and S. Nepal, “P2DPI: Practical and privacy-preserving deep packet inspection,” in Proc. ACM Asia Conf. Comput. Commun. Secur., 2021, pp. 135–146. https://doi.org/10.1145/3433210.3437525
Kim, S.; Yoon, S.; Narantuya, J.; Lim, H. Secure collecting, optimizing, and deploying of firewall rules in software-defined networks. IEEE Access 2020, 8, 15166–15177. DOI:10.1109/ACCESS.2020.2967503
Hakani, D. A Survey on Firewall for cloud security with Anomaly detection in Firewall Policy. In Proceedings of the International Conference on Artificial Intelligence and Smart Communication, Greater Noida, India, 27–29 January 2023; pp. 825–830. DOI:10.1109/AISC56616.2023.10085419
Rajaboevich, G.; Dilbar, K.; Azatovna, A.; Ismoilovna, Q. Comparative Analysis of Methods Content Filtering Network Traffic. Int. J. Emerg. Trends Eng. Res. 2020, 8, 1561–1569 DOI:10.30534/ijeter/2020/15852020
Islam, M.; Uddin, M.; Hossain, D.; Dulal, M.; Ahmed, D.; Shakil, M.; Moazzam, D.; Golam, M. Analysis and Evaluation of Network and Application Security Based on Next Generation Firewall. Int. J. Comput. Digit. Syst. 2023, 13, 193–202 DOI:10.3390/molecules26082297
Rowsan Jahan Bhuiyan, Salma Akter, Aftab Uddin, Md Shujan Shak, Md Rasibul Islam, S M Shadul Islam Rishad, Farzana Sultana, & Md. Hasan-Or-Rashid. (2024). SENTIMENT ANALYSIS OF CUSTOMER FEEDBACK IN THE BANKING SECTOR: A COMPARATIVE STUDY OF MACHINE LEARNING MODELS. The American Journal of Engineering and Technology, 6(10), 54–66. https://doi.org/10.37547/tajet/Volume06Issue10-07
Md Habibur Rahman, Ashim Chandra Das, Md Shujan Shak, Md Kafil Uddin, Md Imdadul Alam, Nafis Anjum, Md Nad Vi Al Bony, & Murshida Alam. (2024). TRANSFORMING CUSTOMER RETENTION IN FINTECH INDUSTRY THROUGH PREDICTIVE ANALYTICS AND MACHINE LEARNING. The American Journal of Engineering and Technology, 6(10), 150–163. https://doi.org/10.37547/tajet/Volume06Issue10-17
Md Salim Chowdhury, Md Shujan Shak, Suniti Devi, Md Rashel Miah, Abdullah Al Mamun, Estak Ahmed, Sk Abu Sheleh Hera, Fuad Mahmud, & MD Shahin Alam Mozumder. (2024). Optimizing E-Commerce Pricing Strategies: A Comparative Analysis of Machine Learning Models for Predicting Customer Satisfaction. The American Journal of Engineering and Technology, 6(09), 6–17. https://doi.org/10.37547/tajet/Volume06Issue09-02
Md Shujan Shak, Md Shahin Alam Mozumder, Md Amit Hasan, Ashim Chandra Das, Md Rashel Miah, Salma Akter, & Md Nur Hossain. (2024). OPTIMIZING RETAIL DEMAND FORECASTING: A PERFORMANCE EVALUATION OF MACHINE LEARNING MODELS INCLUDING LSTM AND GRADIENT BOOSTING. The American Journal of Engineering and Technology, 6(09), 67–80. https://doi.org/10.37547/tajet/Volume06Issue09-09
Md Abu Sayed, Badruddowza, Md Shohail Uddin Sarker, Abdullah Al Mamun, Norun Nabi, Fuad Mahmud, Md Khorshed Alam, Md Tarek Hasan, Md Rashed Buiya, & Mashaeikh Zaman Md. Eftakhar Choudhury. (2024). COMPARATIVE ANALYSIS OF MACHINE LEARNING ALGORITHMS FOR PREDICTING CYBERSECURITY ATTACK SUCCESS: A PERFORMANCE EVALUATION. The American Journal of Engineering and Technology, 6(09), 81–91. https://doi.org/10.37547/tajet/Volume06Issue09-10
Article Statistics
Copyright License
Copyright (c) 2024 Sarvar Norboboyevich Tashev
This work is licensed under a Creative Commons Attribution 4.0 International License.