RANGE ATTACKS IN DISTRIBUTED COMPUTER NETWORKS AND INTERNET

Authors

DOI:

https://doi.org/10.18372/2410-7840.24.17265

Keywords:

computer network, distributed computer networks, remote attack, Internet, network traffic

Abstract

In this article, typical remote attacks and their implementation mechanisms are discussed in detail, as well as network traffic is analyzed, which allows to investigate the logic of work of a distributed computer network, i.e. to obtain an unambiguous correspondence of events that occur in the system and commands that are transmitted between objects system at the time of occurrence of these events. Based on network security research and information availability analysis, those possible remote information destructive effects (remote attacks) that can appear as unwanted effects at any time are described. Types of modification of information and information code are also considered in detail. It was determined that although the protection of information in distributed computer networks and the Internet is a broad and diverse topic, it is clear that Internet technologies are the driving force of development in this sector. Researching this problem is a very complex process and obtaining certain solutions is very important for information security. Modern attacks and, first of all, remote ones, are practically impossible to prevent, therefore, having information about the types and actions of remote attacks in distributed networks, it is possible to ensure the fight against them or at least reduce their impact on information in distributed computer networks and the Internet.

References

Ленков С.В. Методы и средства защиты информации в 2-х томах / Ленков С.В., Перегудов Д.А., Хорошко В.А. – К.: Арий, 2008.

Бурячок В.Л. Основи формування державної системи кібернетичної безпеки / В.Л. Бурячок. – К.: НАУ, 2013. – 432 с.

Бурячок В.Л. Інформаційна та кібербезпека: соціотехнічний аспект / В.Л. Бурячок, В.Б. Толубко, В.О. Хорошко, С.В. Толюпа. – К.: ДУТ, 2015. – 288 с.

Бурячок В.Л. Інформаційний та кіберпростори: проблеми безпеки, методи та засоби боротьби / В.Л. Бурячок, Г.М. Гулак, В.Б. Толубко. – К.: ТОВ «СІК ГРУП Україна», 2015. – 449 с.

Поповский В.В. Защита информации в телекоммуникационных системах. В 2-х томах / В.В. Поповский, А.В. Перенков. – Харьков: ООО «Компания СМИТ», 2006.

Козюра В.Д. Захист інформації в комп’ютерних системах / Козюра, В.Д., Хорошко В.О., Шелест М.Є., Ткач Ю.М., Балюнов О.О. – Ніжин: ФОП Лук’яненкоВ.В.; ТПК”Орхідея”, 2020. – 236 c.

Браіловський М.М. Технології захисту інформації / М.М. Браіловський, С.В. Зибін, І.В. Піскун, В.О. Хорошко, Ю.Є. Хохлачова. – К.: ЦП «Компринт», 2021. – 296 с.

Published

2023-02-24