XAVFSIZ TARMOQ TRAFIGINI UZATISH XUSUSIYATLARI

Авторы

  • Abdujapparova Mubarak Baltabaevna Автор
  • Muradova Alevtina Aleksandrovna Автор
  • Shoysayev Ozodxo’ja Anvarxo’ja o’g’li Автор

Аннотация

Tarmoq texnologiyalarining rivojlanishi, tarmoq orqali uzatiladigan ma’lumotlar hajmining ko'payishi va ko'plab yangi tarmoq protokollarining (shu jumladan yopiq protokollar) joriy etilishi tufayli tarmoq trafigini tahlil qilish tobora dolzarb bo'lib bormoqda

Биографии авторов

  • Abdujapparova Mubarak Baltabaevna

    Muhammad al-Xorazmiy nomidagi Toshkent Axborot Texnologiyalari Universiteti

    “Telekommunikatsiya injiniringi” kafedrasining mudiri, PhD, dotsenti

  • Muradova Alevtina Aleksandrovna

    Muhammad al-Xorazmiy nomidagi Toshkent Axborot Texnologiyalari Universiteti

    “Telekommunikatsiya injiniringi” kafedrasining PhD, dotsenti

  • Shoysayev Ozodxo’ja Anvarxo’ja o’g’li

    Muhammad al-Xorazmiy nomidagi Toshkent Axborot Texnologiyalari Universiteti

    “Telekommunikatsiya injiniringi” mutaxasisligi magirtranti

Библиографические ссылки

FOYDALANILGAN ADABIYOTLAR RO’YHATI

[1] Mike Cloppert. An Overview Of Protocol Reverse-Engineering. https://digitalforensics.sans.org/blog/2012/07/03/an-overview-of-protocol-reverse-engineering

[2] IETF RFC 791. J. Postel. Internet Protocol, September 1981

[3] Antonios Atlasis. Fragmentation (Overlapping) Attacks One Year Later, Troopers 13 – IPv6 Security Summit, 2013

[4] IETF RFC 793. J. Postel. Transmission Control Protocol, September 1981

[5] Judy Novak, Steve Sturges. Target-Based TCP Stream Reassembly, 2007

[6] Jon C. R. Bennett, Craig Partridge, Nicholas Shectman. Packet reordering is not pathological network behavior // IEEE/ACM Transactions on Networking (TON) archive, Volume 7 Issue 6, Dec. 1999, Pages 789-798

Опубликован

2024-11-26

Как цитировать

XAVFSIZ TARMOQ TRAFIGINI UZATISH XUSUSIYATLARI. (2024). Modern Education and Development, 14(8), 99-105. https://scientific-jl.org/mod/article/view/3647