INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE “DIGITAL TECHNOLOGIES: PROBLEMS AND SOLUTIONS OF PRACTICAL IMPLEMENTATION IN THE INDUSTRY” APRIL 27-28, 2023 69
Undan tashqari buyumlar Internetini tarmoq sathiga bo‘ladigan DoS hujumlardan
himoyalanish bo‘yicha choralar keltirilgan.
3-jadval DoS hujumlariga qarshi choralar
Hujum turlari
Qarshi choralar
Soxta marshrutlash ma’lumotlar
hujumlari (spoofed routing
information attacks)
Bu hujumdan himoyalashda autentifikatsiyalash usul
va vositalaridan foydalanish lozim.
Tanlangan yo‘naltiruvchi
hujumlar (Selective forwaring
attacks)
Bu hujumdan himoyalanish uchun vektorni qo‘llab-
quvvatlash mashinalaridan (Support Vector Machines)
foydanish va paket tartib raqamlarini doimiy
tekshirilishi talab etiladi.
Sybil hujumlari (Sybil attacks)
Bu hujumdan himoyalanish uchun autentifikatsiyalash
va ochiq kalitli shifrlash algoritmlaridan (garchi ochiq
kalitli shifrlash algoritmlaridan foydalanish WNS
uchun qimmat bo‘lsa ham) foydalanish talab etiladi.
Undan tashqari autentifikatsuyalash va
identifikatsiyalashni samarali usullaridan foydalanish
maqsadga muvofiq hisoblanadi.
Chuqur hujumlar (sinkhole)
Bu kabi hujumlardan himoyalanishda xavfsizligi
yuqori bo‘lgan protokollardan foydalanish maqsadga
muvofiq.
Qurt teshigi hujumlari (Wormhole
attacks)
Bu hujumdan samarali himoyalanish uchun marshrutni
tanlash jarayonida qo‘llaniladigan xavfsizlik
choralarini takomillashtirish orqali himoyalanish
imkoniyati mavjud bo‘ladi.
Qoratuynuk hujumi (Blackhole
attack)
Bu hujumdan himoyalanish uchun Xavfsizlikdan
xabardor marshrutlash (Security Aware Routing, SAR)
foydalanish zarur.
Kulrang tuynuk hujum (Greyhole
attack)
Bu hujumdan AODV (Ad-hoc On-demand Distance
Vector) protokolidan foydalanish orqali himoyalash
mumkin.
Carousel hujumi (Carousel attack)
Bu hujumdan himoyalanishni asosiy choralari sifatida
MDSDVdan (Modified Destination Sequenced
Distance Vector) foydalanish va routing loopni
keltirish mumkin.
Cho‘zish hujumlari (stretch
attack)
Bu hujumdan himoyalsh uchun RSA 128 bit
foydalanish maqsadga muvofiq hisoblanadi.
Jellyfish hujumi
Bu kabi hujumdan himoyalanish uchun xavfsizlik
sxemalaridan foydalanish yaxshi natija beradi.
Vampire hujumi (Vampire attack
)
Bu hujumdan himoyalanish uchun VSP(Valuable
Secure Protocol), EWMAdan (Energy Wight
Monitoring Algorithm) foydalanish maqsadga muvofiq
hisoblanadi.
Charchagan (Exhausted)
Bu hujumdan himoyalanish uchun tezlikni chegaralash
usulidan foydalanish maqsadga muvofiq.
Xulosa