XAVFSIZ TARMOQ TRAFIGINI UZATISH XUSUSIYATLARI

Authors

  • Abdujapparova Mubarak Baltabaevna Author
  • Muradova Alevtina Aleksandrovna Author
  • Shoysayev Ozodxo’ja Anvarxo’ja o’g’li Author

Abstract

Tarmoq texnologiyalarining rivojlanishi, tarmoq orqali uzatiladigan ma’lumotlar hajmining ko'payishi va ko'plab yangi tarmoq protokollarining (shu jumladan yopiq protokollar) joriy etilishi tufayli tarmoq trafigini tahlil qilish tobora dolzarb bo'lib bormoqda

Author Biographies

  • Abdujapparova Mubarak Baltabaevna

    Muhammad al-Xorazmiy nomidagi Toshkent Axborot Texnologiyalari Universiteti

    “Telekommunikatsiya injiniringi” kafedrasining mudiri, PhD, dotsenti

  • Muradova Alevtina Aleksandrovna

    Muhammad al-Xorazmiy nomidagi Toshkent Axborot Texnologiyalari Universiteti

    “Telekommunikatsiya injiniringi” kafedrasining PhD, dotsenti

  • Shoysayev Ozodxo’ja Anvarxo’ja o’g’li

    Muhammad al-Xorazmiy nomidagi Toshkent Axborot Texnologiyalari Universiteti

    “Telekommunikatsiya injiniringi” mutaxasisligi magirtranti

References

FOYDALANILGAN ADABIYOTLAR RO’YHATI

[1] Mike Cloppert. An Overview Of Protocol Reverse-Engineering. https://digitalforensics.sans.org/blog/2012/07/03/an-overview-of-protocol-reverse-engineering

[2] IETF RFC 791. J. Postel. Internet Protocol, September 1981

[3] Antonios Atlasis. Fragmentation (Overlapping) Attacks One Year Later, Troopers 13 – IPv6 Security Summit, 2013

[4] IETF RFC 793. J. Postel. Transmission Control Protocol, September 1981

[5] Judy Novak, Steve Sturges. Target-Based TCP Stream Reassembly, 2007

[6] Jon C. R. Bennett, Craig Partridge, Nicholas Shectman. Packet reordering is not pathological network behavior // IEEE/ACM Transactions on Networking (TON) archive, Volume 7 Issue 6, Dec. 1999, Pages 789-798

Published

2024-11-26

How to Cite

XAVFSIZ TARMOQ TRAFIGINI UZATISH XUSUSIYATLARI. (2024). Modern Education and Development, 14(8), 99-105. https://scientific-jl.org/mod/article/view/3647