599

In this paper a formal model for protecting information from DDoS attacks, allows to improve the efficiency of computer networks, taking into account the interaction of detection modules and the use of formal set-theoretic constructions are proposed. 

  • Internet havola
  • DOI
  • UzSCI tizimida yaratilgan sana 10-01-2020
  • O'qishlar soni 562
  • Nashr sanasi 19-10-2018
  • Asosiy tilIngliz
  • Sahifalar33-37
English

In this paper a formal model for protecting information from DDoS attacks, allows to improve the efficiency of computer networks, taking into account the interaction of detection modules and the use of formal set-theoretic constructions are proposed. 

Muallifning F.I.Sh. Lavozimi Tashkilot nomi
1 Karimov M.M. Director of the State Testing Center under the Cabinet of Ministers of the Republic of Uzbekistan, Address: Bogi Shamol street, 12, 100202, Tashkent city, Republic of Uzbekistan E-mail: 1dr.mmkarimov@rambler.ru Director of the State Testing Center under the Cabinet of Ministers of the Republic of Uzbekistan,
2 Gulomov S.R. PhD of Providing Information Security Department Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Address: Amir Temur street, 108, 100200, Tashkent city, Republic of Uzbekistan E-mail: 2sherhisor30@gmail.com TUIT
Havola nomi
1 1. Kotenko and E. Doynikova, “Security assessment of computer networks based on attack graphs and security events,” Bali, Indonesia, LNCS, vol. 8047. SpringerVerlag, April 2014, pp. 462–471. 2. Behrouz A. Forouzan. Data Communications and Networking. 5th Edition / McGraw-Hill Forouzan series, New-York USA, 2007.  P.1134. 3. William Stallings. Data and Computer Communications (10th Edition). International Edition, 2013.  P.912. 4. D. van Dalen: Logic and Structure (4th extended ed. Revised). (Springer Verlag, Berlin, 2008). M. Rathjen: Metamathematical Properties of Intuitionistic Set Theories with Choice Principles. In: S.B. Cooper, B.Lowe, A.Sorbi (eds.): New Computational Paradigms: Changing Conceptions of What is Computable (Springer, New York, 2008) P.287-312.
Kutilmoqda