ALGORITHMS FOR IDENTIFICATION AND ELIMINATION OF RISKS IN PACKET FILTERING RULES
Authors: Sherzod Gulomov, Sherzod Sayfullaev
Affiliation: Tashkent university of information technologies named after Muhammad al-Khwarizmi
Category:
Keywords: fuzzy petri net, packet filtering, fuzzy filtering, risk, network
ABSTRACT. This study focuses on the development and optimization of algorithms to enhance network security and traffic management in information and communication systems. Advanced methods were designed to adaptively modify rule actions based on traffic behavior, reducing risks in network packets and improving security responses. The research emphasizes minimizing vulnerabilities by implementing a dynamic rule-prioritization mechanism that ensures optimal decision-making when accepting or rejecting network packets. Key contributions include the creation of algorithms that effectively identify and mitigate harmful biases in network traffic, enhancing workstation security. Additionally, strategies for optimizing traffic filtering in Software-Defined Networks (SDN) were explored to address evolving network threats. Methods for detecting and managing anomalies in network packets, as well as tools for securing packet headers through the use of inter-network screens, were also developed. The outcomes align with global advancements, incorporating principles from research institutions worldwide, such as cognitive inter-network screens, Next-Generation Firewalls, and Honeypot systems. This work significantly contributes to the development of efficient packet filtering rules and protective measures, ultimately reducing the likelihood of phishing attacks and other network-based threats. These advancements hold promise for bolstering the resilience of modern information systems against increasingly sophisticated cyberattacks.
References:
И.Ю. Терёхина, А.А. Грушо, Е.Е. Тимонина, С.Я. Шоргин, Построение моделей процесса с помощью простых сетей Петри, Системы и средства информ., 2020, том 30, выпуск 4, – С.61–75
Саидахмедов Ш.Х. Модели поведения передачи данных с установлением соединения и их математические формы. РИ, 1999, №4. –С.94–96
Гуломов Ш.Р., Шамшиева Б.М. Моделирование атак для активного анализа уязвимостей компьютерных сетей. “Ахборот технологиялари ва коммуникациялари соҳасида ахборот хавфсизлиги ва киберхавфсизлик муаммолари” Республика миқёсидаги илмий-техник конференция. Тошкент-2018. – С.112-116
Гуломов Шерзод Ражабоевич. Применение математических моделей для оценки Flood атак. “Ахборот технологиялари ва коммуникациялари соҳасида ахборот хавфсизлиги ва киберхавфсизлик муаммолари” Республика миқёсидаги илмий-техник конференция. Тошкент-2018. – С.300-304
Sh.R.Gulomov. Risk detection model in packet filtering rules based on Fuzzy Petri Net. “Technical science and Innovation Journal”, 2021, №3. – P.181-189
Menu