XAVFSIZ TARMOQ TRAFIGINI UZATISH XUSUSIYATLARI
Аннотация
Tarmoq texnologiyalarining rivojlanishi, tarmoq orqali uzatiladigan ma’lumotlar hajmining ko'payishi va ko'plab yangi tarmoq protokollarining (shu jumladan yopiq protokollar) joriy etilishi tufayli tarmoq trafigini tahlil qilish tobora dolzarb bo'lib bormoqda
Библиографические ссылки
FOYDALANILGAN ADABIYOTLAR RO’YHATI
[1] Mike Cloppert. An Overview Of Protocol Reverse-Engineering. https://digitalforensics.sans.org/blog/2012/07/03/an-overview-of-protocol-reverse-engineering
[2] IETF RFC 791. J. Postel. Internet Protocol, September 1981
[3] Antonios Atlasis. Fragmentation (Overlapping) Attacks One Year Later, Troopers 13 – IPv6 Security Summit, 2013
[4] IETF RFC 793. J. Postel. Transmission Control Protocol, September 1981
[5] Judy Novak, Steve Sturges. Target-Based TCP Stream Reassembly, 2007
[6] Jon C. R. Bennett, Craig Partridge, Nicholas Shectman. Packet reordering is not pathological network behavior // IEEE/ACM Transactions on Networking (TON) archive, Volume 7 Issue 6, Dec. 1999, Pages 789-798