RANGE ATTACKS IN DISTRIBUTED COMPUTER NETWORKS AND INTERNET
DOI:
https://doi.org/10.18372/2410-7840.24.17265Keywords:
computer network, distributed computer networks, remote attack, Internet, network trafficAbstract
In this article, typical remote attacks and their implementation mechanisms are discussed in detail, as well as network traffic is analyzed, which allows to investigate the logic of work of a distributed computer network, i.e. to obtain an unambiguous correspondence of events that occur in the system and commands that are transmitted between objects system at the time of occurrence of these events. Based on network security research and information availability analysis, those possible remote information destructive effects (remote attacks) that can appear as unwanted effects at any time are described. Types of modification of information and information code are also considered in detail. It was determined that although the protection of information in distributed computer networks and the Internet is a broad and diverse topic, it is clear that Internet technologies are the driving force of development in this sector. Researching this problem is a very complex process and obtaining certain solutions is very important for information security. Modern attacks and, first of all, remote ones, are practically impossible to prevent, therefore, having information about the types and actions of remote attacks in distributed networks, it is possible to ensure the fight against them or at least reduce their impact on information in distributed computer networks and the Internet.
References
Ленков С.В. Методы и средства защиты информации в 2-х томах / Ленков С.В., Перегудов Д.А., Хорошко В.А. – К.: Арий, 2008.
Бурячок В.Л. Основи формування державної системи кібернетичної безпеки / В.Л. Бурячок. – К.: НАУ, 2013. – 432 с.
Бурячок В.Л. Інформаційна та кібербезпека: соціотехнічний аспект / В.Л. Бурячок, В.Б. Толубко, В.О. Хорошко, С.В. Толюпа. – К.: ДУТ, 2015. – 288 с.
Бурячок В.Л. Інформаційний та кіберпростори: проблеми безпеки, методи та засоби боротьби / В.Л. Бурячок, Г.М. Гулак, В.Б. Толубко. – К.: ТОВ «СІК ГРУП Україна», 2015. – 449 с.
Поповский В.В. Защита информации в телекоммуникационных системах. В 2-х томах / В.В. Поповский, А.В. Перенков. – Харьков: ООО «Компания СМИТ», 2006.
Козюра В.Д. Захист інформації в комп’ютерних системах / Козюра, В.Д., Хорошко В.О., Шелест М.Є., Ткач Ю.М., Балюнов О.О. – Ніжин: ФОП Лук’яненкоВ.В.; ТПК”Орхідея”, 2020. – 236 c.
Браіловський М.М. Технології захисту інформації / М.М. Браіловський, С.В. Зибін, І.В. Піскун, В.О. Хорошко, Ю.Є. Хохлачова. – К.: ЦП «Компринт», 2021. – 296 с.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).