RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR

Illia Laktionov, Andrii Kmit, I. Opirskyy, O. Harasymchuk
{"title":"RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR","authors":"Illia Laktionov, Andrii Kmit, I. Opirskyy, O. Harasymchuk","doi":"10.28925/2663-4023.2022.17.91111","DOIUrl":null,"url":null,"abstract":"To date, information technologies have entered all the spheres of society. Due to the rapid development of scientific and technological progress, the traditional methods of introduction of wars, which are currently underway not only in the field of hostilities, but also in the cybernetic space of society, are also changing. The modern world is characterized by active wars in cyberspace, where one of the most common attacks is DDoS-attack, including critical infrastructure. This is primarily due to the extreme density of integration into the life and activities of the society of various gadgets, electronic devices and the Internet, the violation of which can cause significant damage - both psychological and significant damage to the enemy from the inside. One of the simplest and most popular methods for violating such normal functioning is the use of resource overload, which can even lead to their complete inaccessibility. One of the ways of overload is the use of DDoS-attacks in case of refusal of service. Mass sending external requests to the attacked resource leads to the fact that such a resource in a short period of time is trying to develop a significant number of requests, which will lead to a significant slowdown in its work or even lead to a complete stop of the resource. This work is devoted to the study of the methods by which DDoS-atack are carried out. The most common methods for their implementation and the main methods of protection against them are considered in detail. This work has examined in detail the technologies and methods of protection against DDoS attacks analyzed and relatively existing solutions of ready-made companies for protection. But since information technologies are developing rapidly, DDoS attacks will develop. Consequently, the problem of protection against them is relevant, especially in the conditions of cyber.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity: Education, Science, Technique","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.28925/2663-4023.2022.17.91111","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

To date, information technologies have entered all the spheres of society. Due to the rapid development of scientific and technological progress, the traditional methods of introduction of wars, which are currently underway not only in the field of hostilities, but also in the cybernetic space of society, are also changing. The modern world is characterized by active wars in cyberspace, where one of the most common attacks is DDoS-attack, including critical infrastructure. This is primarily due to the extreme density of integration into the life and activities of the society of various gadgets, electronic devices and the Internet, the violation of which can cause significant damage - both psychological and significant damage to the enemy from the inside. One of the simplest and most popular methods for violating such normal functioning is the use of resource overload, which can even lead to their complete inaccessibility. One of the ways of overload is the use of DDoS-attacks in case of refusal of service. Mass sending external requests to the attacked resource leads to the fact that such a resource in a short period of time is trying to develop a significant number of requests, which will lead to a significant slowdown in its work or even lead to a complete stop of the resource. This work is devoted to the study of the methods by which DDoS-atack are carried out. The most common methods for their implementation and the main methods of protection against them are considered in detail. This work has examined in detail the technologies and methods of protection against DDoS attacks analyzed and relatively existing solutions of ready-made companies for protection. But since information technologies are developing rapidly, DDoS attacks will develop. Consequently, the problem of protection against them is relevant, especially in the conditions of cyber.
网络战争中保护互联网资源免受ddos攻击的工具研究
迄今为止,信息技术已进入社会的各个领域。由于科学技术的飞速发展,不仅在敌对领域,而且在社会控制论空间,传统的战争引入方法也在发生变化。现代世界的特点是网络空间战争活跃,其中最常见的攻击之一是ddos攻击,包括关键基础设施。这主要是由于各种小工具、电子设备和互联网极端密集地融入社会的生活和活动,违反这些设备会造成重大损害-对敌人的心理和从内部造成重大损害。违反这种正常功能的最简单和最流行的方法之一是使用资源过载,这甚至可能导致它们完全无法访问。超载的一种方式是在拒绝服务的情况下使用ddos攻击。大量向被攻击资源发送外部请求会导致这样的资源在短时间内试图开发大量的请求,这将导致其工作明显放缓,甚至导致资源完全停止。本文致力于研究ddos攻击的实施方法。详细讨论了实现它们的最常见方法和针对它们的主要保护方法。本文详细分析了针对DDoS攻击的防护技术和方法,并比较了现有企业的防护解决方案。但是随着信息技术的飞速发展,DDoS攻击也会随之发展。因此,针对它们的保护问题是相关的,特别是在网络条件下。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信