{"title":"SNMP数据采集方法的优缺点","authors":"A. Boyko, V. Varkentin, T. Polyakova","doi":"10.1109/FarEastCon.2019.8934069","DOIUrl":null,"url":null,"abstract":"In the modern world of informatization, the volume of information, as well as its transmission over the network, continues to grow. However, network security solutions do not always keep up with industry development. Despite the large number of studies in the field of network security, there are more problems than solutions. Like any other protocol, SNMP is subjected to DDoS attacks, which can cause significant harm to users. The most common attack is the so-called SNMP Amplification. This article presents the architecture of one of the most vulnerable protocols - SNMP, gives a historical overview of the development of this protocol, describes its advantages and disadvantages, and outlines prospective studies in the field of protection of this protocol. For example, several machine learning methods have been described that are used to analyse network traffic at the SNMP level.","PeriodicalId":395247,"journal":{"name":"2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Advantages and Disadvantages of the Data Collection’s Method Using SNMP\",\"authors\":\"A. Boyko, V. Varkentin, T. Polyakova\",\"doi\":\"10.1109/FarEastCon.2019.8934069\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the modern world of informatization, the volume of information, as well as its transmission over the network, continues to grow. However, network security solutions do not always keep up with industry development. Despite the large number of studies in the field of network security, there are more problems than solutions. Like any other protocol, SNMP is subjected to DDoS attacks, which can cause significant harm to users. The most common attack is the so-called SNMP Amplification. This article presents the architecture of one of the most vulnerable protocols - SNMP, gives a historical overview of the development of this protocol, describes its advantages and disadvantages, and outlines prospective studies in the field of protection of this protocol. For example, several machine learning methods have been described that are used to analyse network traffic at the SNMP level.\",\"PeriodicalId\":395247,\"journal\":{\"name\":\"2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FarEastCon.2019.8934069\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FarEastCon.2019.8934069","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Advantages and Disadvantages of the Data Collection’s Method Using SNMP
In the modern world of informatization, the volume of information, as well as its transmission over the network, continues to grow. However, network security solutions do not always keep up with industry development. Despite the large number of studies in the field of network security, there are more problems than solutions. Like any other protocol, SNMP is subjected to DDoS attacks, which can cause significant harm to users. The most common attack is the so-called SNMP Amplification. This article presents the architecture of one of the most vulnerable protocols - SNMP, gives a historical overview of the development of this protocol, describes its advantages and disadvantages, and outlines prospective studies in the field of protection of this protocol. For example, several machine learning methods have been described that are used to analyse network traffic at the SNMP level.