Kompyuter tarmoqlarida hujum izlarini aniqlash usul va vositalari

Mualliflar

  • Bahodirov Sardorbek Shavkatjon o’g’li Farg‘ona davlat texnika universiteti

##semicolon##

hujum izlari aniqlash##common.commaListSeparator## intrusion detection systems##common.commaListSeparator## signatura asosidagi usul##common.commaListSeparator## anomal asosidagi usul##common.commaListSeparator## AI-based detection##common.commaListSeparator## Snort##common.commaListSeparator## Suricata##common.commaListSeparator## Zeek

Annotatsiya

Kompyuter tarmoqlarida hujum izlarini aniqlash zamonaviy kiberxavfsizlikning asosiy yo‘nalishlaridan biri bo‘lib, turli tahdidlar (DDoS, phishing, ransomware, malware) ga qarshi kurashda muhim rol o‘ynaydi. Ushbu maqola tarmoq hujumlarini aniqlashning asosiy usullari (signatura asosidagi, anomal asosidagi, AI va mashinaviy o‘qitishga asoslangan) va vositalarini (Snort, Suricata, Zeek, OSSEC) tahlil qiladi. So‘nggi tadqiqotlar asosida usullar samaradorligi va kelajak tendensiyalari ko‘rib chiqiladi. Natijada, gibrid yondashuvlar (signatura + anomal + AI) eng yuqori aniqlikni ta’minlashi va tarmoq xavfsizligini oshirishi tasdiqlanadi.

##submission.citations##

1. Hall, J. A. (2014). Network security – an updated perspective. Systems Science & Control Engineering, 2(1), 1–10. https://doi.org/10.1080/21642583.2014.895969

2. Bertomeu, J., Cheynel, E., Floyd, E., & Pan, W. (2021). Using machine learning to detect misstatements. Review of Accounting Studies, 26(2), 468–519. https://doi.org/10.1007/s11142-020-09590-1

3. Kokina, J., & Davenport, T. (2022). The Emergence of Artificial Intelligence: How Automation is Changing Auditing. Journal of Accountancy. https://www.journalofaccountancy.com/issues/2017/apr/ai-auditing-challenges.html

4. Qatawneh, A. M. (2024). The role of artificial intelligence in auditing and fraud detection. Journal of Governance and Regulation, 13(2), 8–18. https://doi.org/10.22495/jgrv13i2p1

5. World Economic Forum. (2025). Global Cybersecurity Outlook 2025. https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2025.pdf

6. Deloitte. (2025). Cybersecurity Report 2025: AI Threats and Advanced Threat Actors. https://www.deloitte.com/us/en/services/consulting/articles/cybersecurity-report-2025.html

7. Tolu Michael. (2025). Snort vs Suricata vs Zeek: Which Open-Source IDS is Best for 2025? https://tolumichael.com/snort-vs-suricata-vs-zeek/

##submission.downloads##

Chop etilgan

2025-12-17

Nashr

Bo'lim

Статьи

##plugins.generic.recommendBySimilarity.heading##

1 2 3 4 5 6 7 8 9 10 > >> 

##plugins.generic.recommendBySimilarity.advancedSearchIntro##