KIBERHUJUMLARNI OLDINI OLISH UCHUN HONEYPOT TEXNOLOGIYASINING AFZALLIKLAR

Authors

  • Omonov Fayziddin Komil o'g'li Toshkent axborot texnologiyalari universiteti telekommunikatsiya texnologiyalari fakulteti
  • Abduraxmonova Dilnoza Alisher qizi Oriental uneversteti Pedagogika va psixologiya yo’nalishi 2-kurs talabasi

Keywords:

Axborot, Internet, honeypot, DMZ, TCP/IP, simulyatsiya

Abstract

Mazkur maqolada kiber xujumlarni oldini olish uchun honeypot texnologiyasining afzalliklar, tarmoq xavfsizligini ta’minlovchi vositalar, honeypotlarni jismoniy yoki virtual ekanligiga qarab farqlash mumkinligi haqida ma’lumotlar berilgan.

References

P. Owezarski, “Unsupervised classification and characterization of honeypot attacks,” in Proceedings of 10th International Conference on Netw and Service Management (CNSM) and Workshop, pp. 10–18, Rio de Janeiro, Brazil, November 2014. View at: Publisher Site Google Scholar

2.S. Dowling, M. Schukat, and E. Barrett, “Improving adaptive honeypot functionality with efficient reinforcement learning parameters for automated malware,”Journal of Cyber Security Technology, vol. 2, no. 2, pp. 75–91, 2018. View at: Google Scholar

3.I. M. M. Matin and B. Rahardjo, “Malware detection using honeypot and machine learning,” inProceedings of 2019 7th International Conference on Cyber and IT Service Management (CITSM), pp. 1–4, Bandung Institute of Technology, Bandung, Indonesia, November 2019.View at:Google Scholar

4.L. Spitzner,Honeypots: Tracking Hackers, Addison-Wesley, Clemson, SC, USA, 2003

Downloads

Published

2023-06-10