Education of the republic of uzbekistan tashkent state technical university named after islam karimov



Download 17,18 Mb.
Pdf ko'rish
bet178/276
Sana22.07.2022
Hajmi17,18 Mb.
#840106
1   ...   174   175   176   177   178   179   180   181   ...   276
Bog'liq
Сборник журналя Техника Инновэйшн

№3/2021 year 
Technical science and innovation
182 
𝑝
𝑒𝑐ℎ𝑜−𝑟𝑒𝑞𝑢𝑒𝑠𝑡
 characteristic, and two fuzzy variables, including Long and Short for assessing 
the risks in packet filtering rules are proposed. As well as, a block diagrams of algorithms for 
the first and second levels of packet filtering rules, which allows to reflect the highest priority 
of rules depending on the acceptance and rejection of packets are developed.
Keywords: 
tokens, Petri net, Access Control List (ACL), packet filtering, SYN-Flood, risks, 
Fuzzy logic, membership degree function.
 
INTRODUCTION.
With the advent of the Internet, there have been many changes in 
people's lives. These changes also affected firms. Most employees in modern companies do not 
use the Internet connection for its intended purpose. User’s "choke" the channel using torrents, 
watching videos on the Internet, downloading files or playing online games. Social networks, 
entertainment portals and other sites, where thousands of new pages are infected every day and 
new modifications of well-known threats appear, have been and remain potential areas of risk 
for the spread of malware and causes of phishing attacks, causes of information leakage, theft 
of passwords and other spyware. To ensure the security and integrity of information, overlap 
channels of possible information leakage and improve network performance, it is necessary to 
control the traffic flow entering the local network. To filter Internet access, it is important to 
analyze network traffic that is generated by users. The solution to such uncontrolled traffic in 
any organization is filtering Internet requests. By controlling access to various resources by 
configuring filters, it can easily solve the issues of using the Internet access channel and 
significantly reduce the risk of overloading the internal resources of the enterprise network, but 
at the same time it is necessary to determine how to correctly and most effectively apply these 
filters.
The classical Petri net is a kind of directed graph consisting of points, transitions, 
directed arcs, markers. Directional arcs connect places with transitions or transitions with 
places. The transition is activated when each location in the transition precondition is fulfilled. 
The tokens that are located in the locations of the Petri net are used to determine the execution 
of the Petri net. The presence or absence of a token in a location may indicate whether the 
condition associated with that location is true or false and the number and position of tokens 
may change during the execution of the Petri net. In general, Petri net can be represented by a 
transition along with an entry point and an exit point. Petri net designations are shown in Figure 
1.1. 

Download 17,18 Mb.

Do'stlaringiz bilan baham:
1   ...   174   175   176   177   178   179   180   181   ...   276




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish