RANGE ATTACKS IN DISTRIBUTED COMPUTER NETWORKS AND INTERNET
DOI:
https://doi.org/10.18372/2410-7840.24.17265Keywords:
computer network, distributed computer networks, remote attack, Internet, network trafficAbstract
In this article, typical remote attacks and their implementation mechanisms are discussed in detail, as well as network traffic is analyzed, which allows to investigate the logic of work of a distributed computer network, i.e. to obtain an unambiguous correspondence of events that occur in the system and commands that are transmitted between objects system at the time of occurrence of these events. Based on network security research and information availability analysis, those possible remote information destructive effects (remote attacks) that can appear as unwanted effects at any time are described. Types of modification of information and information code are also considered in detail. It was determined that although the protection of information in distributed computer networks and the Internet is a broad and diverse topic, it is clear that Internet technologies are the driving force of development in this sector. Researching this problem is a very complex process and obtaining certain solutions is very important for information security. Modern attacks and, first of all, remote ones, are practically impossible to prevent, therefore, having information about the types and actions of remote attacks in distributed networks, it is possible to ensure the fight against them or at least reduce their impact on information in distributed computer networks and the Internet.
References
Ленков С.В. Методы и средства защиты информации в 2-х томах / Ленков С.В., Перегудов Д.А., Хорошко В.А. – К.: Арий, 2008.
Бурячок В.Л. Основи формування державної системи кібернетичної безпеки / В.Л. Бурячок. – К.: НАУ, 2013. – 432 с.
Бурячок В.Л. Інформаційна та кібербезпека: соціотехнічний аспект / В.Л. Бурячок, В.Б. Толубко, В.О. Хорошко, С.В. Толюпа. – К.: ДУТ, 2015. – 288 с.
Бурячок В.Л. Інформаційний та кіберпростори: проблеми безпеки, методи та засоби боротьби / В.Л. Бурячок, Г.М. Гулак, В.Б. Толубко. – К.: ТОВ «СІК ГРУП Україна», 2015. – 449 с.
Поповский В.В. Защита информации в телекоммуникационных системах. В 2-х томах / В.В. Поповский, А.В. Перенков. – Харьков: ООО «Компания СМИТ», 2006.
Козюра В.Д. Захист інформації в комп’ютерних системах / Козюра, В.Д., Хорошко В.О., Шелест М.Є., Ткач Ю.М., Балюнов О.О. – Ніжин: ФОП Лук’яненкоВ.В.; ТПК”Орхідея”, 2020. – 236 c.
Браіловський М.М. Технології захисту інформації / М.М. Браіловський, С.В. Зибін, І.В. Піскун, В.О. Хорошко, Ю.Є. Хохлачова. – К.: ЦП «Компринт», 2021. – 296 с.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.