Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks

At present, issues related to information security are highly relevant. DoS and DDoS attacks are carried out by cybercriminals quite often, because cyberattacks can bring almost any system to failure, leaving no legally significant evidence. At the same time, the failure of the attacked subsystem ca...

Full description

Bibliographic Details
Main Authors: N. V. Evglevskaya, A. Yu. Zuev, A. O. Karasenko, O. S. Lauta
Format: Article
Language:English
Published: CRI «Electronics» 2020-09-01
Series:Радиопромышленность
Subjects:
Online Access:https://www.radioprom.org/jour/article/view/751
id doaj-2a3310601feb4c8fbe3c6ca93ac46457
record_format Article
spelling doaj-2a3310601feb4c8fbe3c6ca93ac464572021-07-28T13:52:37ZengCRI «Electronics»Радиопромышленность2413-95992541-870X2020-09-01303677410.21778/2413-9599-2020-30-3-67-74402Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacksN. V. Evglevskaya0A. Yu. Zuev1A. O. Karasenko2O. S. Lauta3Military Telecommunications Academy named after the Soviet Union Marshal Budienny S.M.Military Telecommunications Academy named after the Soviet Union Marshal Budienny S.M.Military Telecommunications Academy named after the Soviet Union Marshal Budienny S.M.Military Telecommunications Academy named after the Soviet Union Marshal Budienny S.M.At present, issues related to information security are highly relevant. DoS and DDoS attacks are carried out by cybercriminals quite often, because cyberattacks can bring almost any system to failure, leaving no legally significant evidence. At the same time, the failure of the attacked subsystem can be an intermediate stage towards the target system. The most vulnerable to DDoS attacks are online stores, online payment systems, news resources and companies, whose activities depend on the frequency of user access to the resource. The main methods of protection against cyberattacks and DDoS attacks, in particular, are currently antivirus programs and firewalls. The article presents a description of some types of DDoS attacks as well as the results of a comparative analysis of several existing methods of networks security from DDoS attacks, which will simplify the choice of the optimal solution to ensure reliable protection of a telecommunication facility. Considering all the advantages and disadvantages, the method of organizing a network protection system against DDoS attacks based on the technology of artificial neural networks is the most suitable solution for ensuring the information security of networks of various purpose.https://www.radioprom.org/jour/article/view/751ddos attackbotnetprotectionattack preventionattack detectionattack repulsion
collection DOAJ
language English
format Article
sources DOAJ
author N. V. Evglevskaya
A. Yu. Zuev
A. O. Karasenko
O. S. Lauta
spellingShingle N. V. Evglevskaya
A. Yu. Zuev
A. O. Karasenko
O. S. Lauta
Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks
Радиопромышленность
ddos attack
botnet
protection
attack prevention
attack detection
attack repulsion
author_facet N. V. Evglevskaya
A. Yu. Zuev
A. O. Karasenko
O. S. Lauta
author_sort N. V. Evglevskaya
title Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks
title_short Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks
title_full Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks
title_fullStr Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks
title_full_unstemmed Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks
title_sort comparative analysis of the effectiveness of existing methods of networks security from ddos attacks
publisher CRI «Electronics»
series Радиопромышленность
issn 2413-9599
2541-870X
publishDate 2020-09-01
description At present, issues related to information security are highly relevant. DoS and DDoS attacks are carried out by cybercriminals quite often, because cyberattacks can bring almost any system to failure, leaving no legally significant evidence. At the same time, the failure of the attacked subsystem can be an intermediate stage towards the target system. The most vulnerable to DDoS attacks are online stores, online payment systems, news resources and companies, whose activities depend on the frequency of user access to the resource. The main methods of protection against cyberattacks and DDoS attacks, in particular, are currently antivirus programs and firewalls. The article presents a description of some types of DDoS attacks as well as the results of a comparative analysis of several existing methods of networks security from DDoS attacks, which will simplify the choice of the optimal solution to ensure reliable protection of a telecommunication facility. Considering all the advantages and disadvantages, the method of organizing a network protection system against DDoS attacks based on the technology of artificial neural networks is the most suitable solution for ensuring the information security of networks of various purpose.
topic ddos attack
botnet
protection
attack prevention
attack detection
attack repulsion
url https://www.radioprom.org/jour/article/view/751
work_keys_str_mv AT nvevglevskaya comparativeanalysisoftheeffectivenessofexistingmethodsofnetworkssecurityfromddosattacks
AT ayuzuev comparativeanalysisoftheeffectivenessofexistingmethodsofnetworkssecurityfromddosattacks
AT aokarasenko comparativeanalysisoftheeffectivenessofexistingmethodsofnetworkssecurityfromddosattacks
AT oslauta comparativeanalysisoftheeffectivenessofexistingmethodsofnetworkssecurityfromddosattacks
_version_ 1721270357718990848