XAVFSIZ TARMOQ TRAFIGINI UZATISH XUSUSIYATLARI
##article.abstract##
Tarmoq texnologiyalarining rivojlanishi, tarmoq orqali uzatiladigan ma’lumotlar hajmining ko'payishi va ko'plab yangi tarmoq protokollarining (shu jumladan yopiq protokollar) joriy etilishi tufayli tarmoq trafigini tahlil qilish tobora dolzarb bo'lib bormoqda
##submission.citations##
FOYDALANILGAN ADABIYOTLAR RO’YHATI
[1] Mike Cloppert. An Overview Of Protocol Reverse-Engineering. https://digitalforensics.sans.org/blog/2012/07/03/an-overview-of-protocol-reverse-engineering
[2] IETF RFC 791. J. Postel. Internet Protocol, September 1981
[3] Antonios Atlasis. Fragmentation (Overlapping) Attacks One Year Later, Troopers 13 – IPv6 Security Summit, 2013
[4] IETF RFC 793. J. Postel. Transmission Control Protocol, September 1981
[5] Judy Novak, Steve Sturges. Target-Based TCP Stream Reassembly, 2007
[6] Jon C. R. Bennett, Craig Partridge, Nicholas Shectman. Packet reordering is not pathological network behavior // IEEE/ACM Transactions on Networking (TON) archive, Volume 7 Issue 6, Dec. 1999, Pages 789-798