Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks
At present, issues related to information security are highly relevant. DoS and DDoS attacks are carried out by cybercriminals quite often, because cyberattacks can bring almost any system to failure, leaving no legally significant evidence. At the same time, the failure of the attacked subsystem ca...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
CRI «Electronics»
2020-09-01
|
Series: | Радиопромышленность |
Subjects: | |
Online Access: | https://www.radioprom.org/jour/article/view/751 |
id |
doaj-2a3310601feb4c8fbe3c6ca93ac46457 |
---|---|
record_format |
Article |
spelling |
doaj-2a3310601feb4c8fbe3c6ca93ac464572021-07-28T13:52:37ZengCRI «Electronics»Радиопромышленность2413-95992541-870X2020-09-01303677410.21778/2413-9599-2020-30-3-67-74402Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacksN. V. Evglevskaya0A. Yu. Zuev1A. O. Karasenko2O. S. Lauta3Military Telecommunications Academy named after the Soviet Union Marshal Budienny S.M.Military Telecommunications Academy named after the Soviet Union Marshal Budienny S.M.Military Telecommunications Academy named after the Soviet Union Marshal Budienny S.M.Military Telecommunications Academy named after the Soviet Union Marshal Budienny S.M.At present, issues related to information security are highly relevant. DoS and DDoS attacks are carried out by cybercriminals quite often, because cyberattacks can bring almost any system to failure, leaving no legally significant evidence. At the same time, the failure of the attacked subsystem can be an intermediate stage towards the target system. The most vulnerable to DDoS attacks are online stores, online payment systems, news resources and companies, whose activities depend on the frequency of user access to the resource. The main methods of protection against cyberattacks and DDoS attacks, in particular, are currently antivirus programs and firewalls. The article presents a description of some types of DDoS attacks as well as the results of a comparative analysis of several existing methods of networks security from DDoS attacks, which will simplify the choice of the optimal solution to ensure reliable protection of a telecommunication facility. Considering all the advantages and disadvantages, the method of organizing a network protection system against DDoS attacks based on the technology of artificial neural networks is the most suitable solution for ensuring the information security of networks of various purpose.https://www.radioprom.org/jour/article/view/751ddos attackbotnetprotectionattack preventionattack detectionattack repulsion |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
N. V. Evglevskaya A. Yu. Zuev A. O. Karasenko O. S. Lauta |
spellingShingle |
N. V. Evglevskaya A. Yu. Zuev A. O. Karasenko O. S. Lauta Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks Радиопромышленность ddos attack botnet protection attack prevention attack detection attack repulsion |
author_facet |
N. V. Evglevskaya A. Yu. Zuev A. O. Karasenko O. S. Lauta |
author_sort |
N. V. Evglevskaya |
title |
Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks |
title_short |
Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks |
title_full |
Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks |
title_fullStr |
Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks |
title_full_unstemmed |
Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks |
title_sort |
comparative analysis of the effectiveness of existing methods of networks security from ddos attacks |
publisher |
CRI «Electronics» |
series |
Радиопромышленность |
issn |
2413-9599 2541-870X |
publishDate |
2020-09-01 |
description |
At present, issues related to information security are highly relevant. DoS and DDoS attacks are carried out by cybercriminals quite often, because cyberattacks can bring almost any system to failure, leaving no legally significant evidence. At the same time, the failure of the attacked subsystem can be an intermediate stage towards the target system. The most vulnerable to DDoS attacks are online stores, online payment systems, news resources and companies, whose activities depend on the frequency of user access to the resource. The main methods of protection against cyberattacks and DDoS attacks, in particular, are currently antivirus programs and firewalls. The article presents a description of some types of DDoS attacks as well as the results of a comparative analysis of several existing methods of networks security from DDoS attacks, which will simplify the choice of the optimal solution to ensure reliable protection of a telecommunication facility. Considering all the advantages and disadvantages, the method of organizing a network protection system against DDoS attacks based on the technology of artificial neural networks is the most suitable solution for ensuring the information security of networks of various purpose. |
topic |
ddos attack botnet protection attack prevention attack detection attack repulsion |
url |
https://www.radioprom.org/jour/article/view/751 |
work_keys_str_mv |
AT nvevglevskaya comparativeanalysisoftheeffectivenessofexistingmethodsofnetworkssecurityfromddosattacks AT ayuzuev comparativeanalysisoftheeffectivenessofexistingmethodsofnetworkssecurityfromddosattacks AT aokarasenko comparativeanalysisoftheeffectivenessofexistingmethodsofnetworkssecurityfromddosattacks AT oslauta comparativeanalysisoftheeffectivenessofexistingmethodsofnetworkssecurityfromddosattacks |
_version_ |
1721270357718990848 |