|
ANALYSIS OF CYBER ATTACKS ONBog'liq axborot-kommunikatsiya-tizimlariga-bo-ladigan-kiberhujumlar-tahlili-va-tasnifiANALYSIS OF CYBER ATTACKS ON
INFORMATION AND COMMUNICATION SYSTEMS
AND THEIR CLASSIFICATION
Kadirov Mir-Khusan Mirpulatovich,
Doctor of Philosophy in Technical Sciences (PhD),
Associate Professor of the Department of
Information Technology
Tashkent State Technical University named after
Islam Karimov
Abstract.
This article analyzes distributed
cyberattacks of the “Denial of Service” type and
develops their classifi cation. A description of the
shortcomings and vulnerabilities of distributed
denial-of-service attacks by category is given. An
implementation diagram with examples for each
category of distributed denial of service attacks
is presented. Analyzed the number of attacks
carried out by attackers, as well as the purpose
and type of attack used. According to the results
of the study, the UDP-fl ood 53.64% attack type
is the most commonly used type by attackers in
implementing distributed attacks, and the GRE-fl ood
1.41% is defi ned as the least used type. Distributed
denial of service attacks are the major concern for
the security experts. This paper can be useful for
researchers and cyber security expert to provide the
better understanding of distributed denial of service
attacks tools in present times.
Keywords:
cybersecurity, attack types, DDoS, UDP
fl ood, ICMP fl ood, SYN fl ood, RTP fl ood, Slowloris.
va aniqlash muammolari J. Cannady, D. Den-
ning, J. Mirkovic, S. Zargar, J. Joshi, R.B. Lee,
V. Paxson (AQSh), G. Kambourakis (Gretsiya),
S. Behal, A. Bhandari, K. Bhushan (Hindiston),
R. Chang (Yaponiya), P. Zegzhda, D. Lavrova,
I. Alekseev (Rossiya), M. Karimov, S. Ganiyev,
K. Tashev, Sh. Gulomov (Oʻzbekiston) kabi
chet el va respublikamiz olimlari tomonidan
o‘rganilgan.
R. Kesavamoorthy (Kesavamoorthy, 2020)
xizmat koʻrsatishdan voz kechishga undov-
chi hujumlarni rejimi, oqimi, ta’siri va joy-
lashuviga ko‘ra tasni�lagan. Olim �lood tu-
ridagi hujumlarni ikki qismga ajratgan:
1) tarmoq darajasidagi hujumlar; 2) ilova da-
rajasidagi hujumlar.
V.S. Xaritonov va D.P. Cheryapkinlar
(Kharitonov & Cheryapkin, 2016) xizmat koʻr-
satishdan voz kechishga undovchi hujumlarni
protokollar orqali qilinadigan hujumlar, ta’sir
ko‘rsatish mexanizmi boʻyicha hujumlar va
ilovalar darajasidagi hujumlarga ajratgan.
Ushbu masala koʻplab tadqiqot ishlarida
o‘rganilgan boʻlsa-da, lekin yovuz niyatli foy-
dalanuvchilar tomonidan takomillashtiril-
gan kiberhujumlarning amalga oshirilishi
davom etmoqda. Shu sababli xizmat koʻr-
satishdan voz kechishga undovchi taqsim-
langan hujumlarni tasni�lash dolzarb ma-
sala hisoblanadi. Bu esa mazkur tadqiqot
mavzusining maqsadi va aniq vazifalarini
belgilab beradi.
|
| |