ANALYSIS OF CYBER ATTACKS ON




Download 1,34 Mb.
Pdf ko'rish
bet4/12
Sana23.05.2024
Hajmi1,34 Mb.
#251628
1   2   3   4   5   6   7   8   9   ...   12
Bog'liq
axborot-kommunikatsiya-tizimlariga-bo-ladigan-kiberhujumlar-tahlili-va-tasnifi

ANALYSIS OF CYBER ATTACKS ON 
INFORMATION AND COMMUNICATION SYSTEMS 
AND THEIR CLASSIFICATION
Kadirov Mir-Khusan Mirpulatovich,
Doctor of Philosophy in Technical Sciences (PhD),
Associate Professor of the Department of 
Information Technology
Tashkent State Technical University named after 
Islam Karimov
Abstract. 
This article analyzes distributed 
cyberattacks of the “Denial of Service” type and 
develops their classifi cation. A description of the 
shortcomings and vulnerabilities of distributed 
denial-of-service attacks by category is given. An 
implementation diagram with examples for each 
category of distributed denial of service attacks 
is presented. Analyzed the number of attacks 
carried out by attackers, as well as the purpose 
and type of attack used. According to the results 
of the study, the UDP-fl ood 53.64% attack type 
is the most commonly used type by attackers in 
implementing distributed attacks, and the GRE-fl ood 
1.41% is defi ned as the least used type. Distributed 
denial of service attacks are the major concern for 
the security experts. This paper can be useful for 
researchers and cyber security expert to provide the 
better understanding of distributed denial of service 
attacks tools in present times.
Keywords: 
cybersecurity, attack types, DDoS, UDP 
fl ood, ICMP fl ood, SYN fl ood, RTP fl ood, Slowloris.
va aniqlash muammolari J. Cannady, D. Den-
ning, J. Mirkovic, S. Zargar, J. Joshi, R.B. Lee, 
V. Paxson (AQSh), G. Kambourakis (Gretsiya), 
S. Behal, A. Bhandari, K. Bhushan (Hindiston), 
R. Chang (Yaponiya), P. Zegzhda, D. Lavrova, 
I. Alekseev (Rossiya), M. Karimov, S. Ganiyev, 
K. Tashev, Sh. Gulomov (Oʻzbekiston) kabi 
chet el va respublikamiz olimlari tomonidan 
o‘rganilgan. 
R. Kesavamoorthy (Kesavamoorthy, 2020) 
xizmat koʻrsatishdan voz kechishga undov-
chi hujumlarni rejimi, oqimi, ta’siri va joy-
lashuviga ko‘ra tasni�lagan. Olim �lood tu-
ridagi hujumlarni ikki qismga ajratgan: 
1) tarmoq darajasidagi hujumlar; 2) ilova da-
rajasidagi hujumlar.
V.S. Xaritonov va D.P. Cheryapkinlar 
(Kharitonov & Cheryapkin, 2016) xizmat koʻr-
satishdan voz kechishga undovchi hujumlarni 
protokollar orqali qilinadigan hujumlar, ta’sir 
ko‘rsatish mexanizmi boʻyicha hujumlar va 
ilovalar darajasidagi hujumlarga ajratgan.
Ushbu masala koʻplab tadqiqot ishlarida 
o‘rganilgan boʻlsa-da, lekin yovuz niyatli foy-
dalanuvchilar tomonidan takomillashtiril-
gan kiberhujumlarning amalga oshirilishi 
davom etmoqda. Shu sababli xizmat koʻr-
satishdan voz kechishga undovchi taqsim-
langan hujumlarni tasni�lash dolzarb ma-
sala hisoblanadi. Bu esa mazkur tadqiqot 
mavzusining maqsadi va aniq vazifalarini 
belgilab beradi.

Download 1,34 Mb.
1   2   3   4   5   6   7   8   9   ...   12




Download 1,34 Mb.
Pdf ko'rish