Methods and models of protecting computer networks from un-wanted network traffic

  • Authors

    • Gulomov Sherzod Rajaboevich PhD, Department Providing Information Security, Tashkent University of Information Technologies named after Muhammad al-Khwarizmi
    • Ganiev Abdukhalil Abdujalilovich
  • TCP SYN Flood, Ping of Death, Tribe Flood Network (TFN), Stacheldraht, IP Spoofing.
  • In this article a method of measure network traffic to collect data about the header of packets and to analyze the traffic dump in computer networks are offered. A method for detecting anomalies and a formal model for protecting information from DDoS attacks, which make it possible to simplify the development of filter rule sets and improve the efficiency of computer networks, taking into account, the interaction of detection modules and the use of formal set-theoretic constructions are proposed.

  • References

    1. [1] LinY-D., LuCh-N., LaiY- Ch., etal. Application classification using packet size distribution and port association // J. Network Computer Appl. 2009. V.32. - P.1023-1030.

      [2] Gulomov Sh.R. Rakhmanova G.S., Boymurodov B.E. Ensuring Secure Info-Communication Networks Based on the Special Filtering Mode. International Journal of Engineering Innovation & Research. Volume 5, Issue 1, 2016, ISSN: 2277 – 5668, India, -P.16-23.

      [3] William Stallings. Network security essentials: Applications and Standards Fourth edition. Prentice Hall, USA, 2011. - P.417.

      [4] Behrouz A. Forouzan. Data Communications and Networking.5th Edition / McGraw-Hill Forouzan series, New-York USA, 2007. - P.1134.

      [5] William Stallings. Data and Computer Communications (10th Edition). International Edition, 2013. - P.912.

      [6] D. van Dalen: Logic and Structure (fourth extended ed. Revised). (Springer Verlag, Berlin, 2008).

      [7] M. Rathjen: Metamathematical Properties of Intuitionistic Set Theories with Choice Principles. In: S.B. Cooper, B.Lowe, A.Sorbi (eds.): New Computational Paradigms: Changing Conceptions of What is Computable (Springer, New York, 2008) P.287-312.

  • Downloads

    Additional Files

  • How to Cite

    Rajaboevich, G. S., & Abdujalilovich, G. A. (2018). Methods and models of protecting computer networks from un-wanted network traffic. International Journal of Engineering & Technology, 7(4), 2541-2545.