Linux serverlarda xavfsizlikni ta’minlashning zamonaviy usullari

Authors

  • Zuhra Turgʻunboyeva Farg‘ona davlat texnika universiteti
  • Xadicha Alekseyeva Farg‘ona davlat texnika universiteti

Abstract

Mazkur maqolada Linux serverlarda axborot xavfsizligini ta’minlashning zamonaviy usullari tahlil qilinadi. Xususan, tizim darajasida himoya mexanizmlari, autentifikatsiya va avtorizatsiya vositalari, tarmoq xavfsizligi, hamda hujumlarni aniqlash va oldini olish texnologiyalari ko‘rib chiqiladi. SSH konfiguratsiyasini kuchaytirish, firewall (iptables, nftables) sozlash, SELinux/AppArmor kabi majburiy kirish nazorati tizimlari, hamda IDS/IPS yechimlarining samaradorligi ilmiy asosda yoritiladi. Tadqiqot natijalari Linux serverlarni kompleks himoyalashda ko‘p qatlamli (multi-layered) xavfsizlik yondashuvi eng samarali ekanligini ko‘rsatadi.

Kalit so‘zlar: Linux server, axborot xavfsizligi, firewall, SSH, autentifikatsiya, SELinux, AppArmor, IDS/IPS, tarmoq xavfsizligi, kirish nazorati, xavfsizlik siyosati, kiberxavfsizlik, monitoring, log tahlili

References

1. Nemeth E., Snyder G., Hein T. R. Linux Administration Handbook. — Boston: Prentice Hall, 2017. — 1232 p.

2. Shotts W. The Linux Command Line. — San Francisco: No Starch Press, 2019. — 480 p.

3. Barrett D., Silverman R., Byrnes R. SSH, The Secure Shell: The Definitive Guide. — Sebastopol: O’Reilly Media, 2005. — 672 p.

4. Smith R. Linux Security Cookbook. — Sebastopol: O’Reilly Media, 2008. — 720 p.

5. Garfinkel S., Spafford G., Schwartz A. Practical UNIX and Internet Security. — Boston: Addison-Wesley, 2003. — 989 p.

6. Rash M. Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort. — San Francisco: No Starch Press, 2007. — 448 p.

7. Behl B., Behl K. Cybersecurity and Cyberwar: What Everyone Needs to Know. — Oxford: Oxford University Press, 2017. — 304 p.

Downloads

Published

2026-05-04

How to Cite

Turgʻunboyeva, Z., & Alekseyeva, X. (2026). Linux serverlarda xavfsizlikni ta’minlashning zamonaviy usullari. Research and Implementation, 4(4/2), 131–133. Retrieved from https://rai-journal.uz/index.php/rai/article/view/2928

Issue

Section

Статьи