WEB ILOVALARGA BO‘LADIGAN HUJUMLAR TASNIFI
Keywords:
Maxfiylik hujumlari, foydalanuvchanlik hujumlari, yaxlitlik hujumlari, parolni qidirish hujumlari, fishing hujumlari, koddagi zaifliklar.Abstract
Ushbu maqolada veb ilovalarga qaratilgan autentifikatsiya hujumlari, maxfiylikni, foydalanuvchanlikni, yaxlitlik buzishga qaratilgan hujumlar, parolni qidirish hujumlari, fishing hujumlari tahlil etilgan, ularni amalga oshirish usullari tadqiq etilgan hamda ularni oldini olish usullari taklif etilgan.
Downloads
References
Askar T. Rakhmanov, Rustam Kh. Khamdamov, Komil F. Kerimov,
Shukhrat K. Kamalov, Automatic Vulnerability Detection Algorithm for the SQLInjection// Journal of Automation and Information Sciences DOI:
10.1615/JAutomatInfScien. v51.i6.60 New York, USA 7,2019. –pp.47-54. Scopus
(https://www.scopus.com/sourceid/25497).
Ibrohimov A.R. “Веб серверлардаги заифликларни гуруҳлаш усули ва алгоритми”, “Муҳаммад ал-Хоразмий авлодлари” журнали. N 2(20)/2022. –Б. 15-22.
A. Büyükçakir, H. Bonab, F. Can A novel online stacked ensemble for multi-label stream classification International Conference on Information and Knowledge Management, Proceedings, Association for Computing Machinery (2018), pp. 1063-1072.
R. Devi, M. Abualkibash Intrusion detection system classification using different machine learning algorithms on KDD-99 and NSL-KDD datasets - a review paper International Journal of Computer Science and Information Technology, 11 (2019), pp. 65-80.
Ibrohimov A.R . Tarmoq hujumlarini aniqlash usul va algoritmlari, International conference Recent advances in intelligent information and communication technologies “ISPC-2022” Tashkent -2022, pp. 352-356.
Хамдамов Р.Х., Керимов К.Ф., Методы блокирования уязвимостей вида XSS на основе сервис ориентированной архитектуры // Международный научно-технический журнал ―Проблемы управления и информатики‖. – Украина, Киев 2019. – №6. – С.86-91.