COMPUTER NETWORK PROTECTIONSYSTEM
DOI:
https://doi.org/10.26906/SUNZ.2022.2.091Keywords:
security aspects, Internet attack, Internet protocol, computer network, cryptographic systems, network security, network security software, intrusion detection systemAbstract
This article highlights the basics of protecting information in computer systems from unauthorized access. Because network security is an important area that is gaining momentum, as Internet attacks and other threats grow exponentially. Security threats and the Internet Protocol were analyzed to assess the necessary changes in the security of computer network systems. Most security technologies are based on software, but we currently need to use additional hardware protection systems. The main factors that must be taken into account when designing a secure network are considered. The most common methods of Internet attacks and other threats in modern computer networks are analyzed. The security mechanisms for a set of Internet protocols at different levels, which provide logical protection of data units when they move on the network, have been studied. The security implications of the current and new versions of the Internet Protocol have been assessed. It also covers modern security technologies on the Internet and intrusion detection systems. The advancement of computer network security systems has not only been the creation of new concepts and methods, but often the modification of the same technologies that are already in use. In the near future, a combination of IPv6 and security features, such as firewalls, intrusion detection, and authentication procedures, will be successful in protecting networks. An effective network security plan has been developed with an understanding of security issues, potential attackers, the required level of security, and the factors that make the network vulnerable to attacks. As a result, a reliable algorithm of the computer network protection system has been developed based on the use of effective protection and attack detection mechanisms.Downloads
References
Грайворонський М. В. Безпека інформаційно-комунікаційних систем / М. В. Грайворонський, О. М. Новіков – К.: Видавнича група ВНV, 2009. – 608 с.
Bound (ed.), “IPv6 Enterprise Network Scenarios”. IETF Internet Draft. July 2004.
Durand, S. Roy, and J. Paugh, “Issues with Dual Stack IPv6 on by Default”. IETF Internet Draft. July 2004.
Михайлюта С. Л., Степанушко І. В., Бабич Б. О., Ткаченко В. Ю., Лавринович В. С. Дослідження мережевих DOS-атак, що ґрунтуються на використанні протоколу ICMP // Вісник Інженерної академії України. - К.: 2009. – № 2. – С. 146–149.
Вертузаєв M. C., Юрченко O. M. Захист інформації в комп’ютерних системах від несанкціонованого доступу: Навч. посібник / За ред. С. ГЛаптєва,— К.: Вид-во Європ. ун-ту, 2001.— 321 с.