Kompyuter tarmoqlarida hujum izlarini aniqlash usul va vositalari

Авторы

  • Sardorbek Bahodirov Farg‘ona davlat texnika universiteti

Kalit so'zlar:

hujum izlari aniqlash, intrusion detection systems, signatura asosidagi usul, anomal asosidagi usul, AI-based detection, Snort, Suricata, Zeek

Annotatsiya

Kompyuter tarmoqlarida hujum izlarini aniqlash zamonaviy kiberxavfsizlikning asosiy yo‘nalishlaridan biri bo‘lib, turli tahdidlar (DDoS, phishing, ransomware, malware) ga qarshi kurashda muhim rol o‘ynaydi. Ushbu maqola tarmoq hujumlarini aniqlashning asosiy usullari (signatura asosidagi, anomal asosidagi, AI va mashinaviy o‘qitishga asoslangan) va vositalarini (Snort, Suricata, Zeek, OSSEC) tahlil qiladi. So‘nggi tadqiqotlar asosida usullar samaradorligi va kelajak tendensiyalari ko‘rib chiqiladi. Natijada, gibrid yondashuvlar (signatura + anomal + AI) eng yuqori aniqlikni ta’minlashi va tarmoq xavfsizligini oshirishi tasdiqlanadi.

Библиографические ссылки

1. Hall, J. A. (2014). Network security – an updated perspective. Systems Science & Control Engineering, 2(1), 1–10. https://doi.org/10.1080/21642583.2014.895969

2. Bertomeu, J., Cheynel, E., Floyd, E., & Pan, W. (2021). Using machine learning to detect misstatements. Review of Accounting Studies, 26(2), 468–519. https://doi.org/10.1007/s11142-020-09590-1

3. Kokina, J., & Davenport, T. (2022). The Emergence of Artificial Intelligence: How Automation is Changing Auditing. Journal of Accountancy. https://www.journalofaccountancy.com/issues/2017/apr/ai-auditing-challenges.html

4. Qatawneh, A. M. (2024). The role of artificial intelligence in auditing and fraud detection. Journal of Governance and Regulation, 13(2), 8–18. https://doi.org/10.22495/jgrv13i2p1

5. World Economic Forum. (2025). Global Cybersecurity Outlook 2025. https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2025.pdf

6. Deloitte. (2025). Cybersecurity Report 2025: AI Threats and Advanced Threat Actors. https://www.deloitte.com/us/en/services/consulting/articles/cybersecurity-report-2025.html

7. Tolu Michael. (2025). Snort vs Suricata vs Zeek: Which Open-Source IDS is Best for 2025? https://tolumichael.com/snort-vs-suricata-vs-zeek/

Загрузки

Опубликован

2025-12-17

Как цитировать

Bahodirov, S. (2025). Kompyuter tarmoqlarida hujum izlarini aniqlash usul va vositalari. Research and Implementation, (Spec 3(2), 220–223. извлечено от https://rai-journal.uz/index.php/rai/article/view/2120

Выпуск

Раздел

Статьи

Похожие статьи

<< < 5 6 7 8 9 10 11 12 13 14 > >> 

Вы также можете начать расширеннвй поиск похожих статей для этой статьи.