Skip to main navigation menu Skip to main content Skip to site footer

COMPUTER NETWORKS AND THEIR SECURITY

Abstract

This article provides a detailed analysis of modern methodologies and technologies for ensuring network security. The main security elements of our research are cryptographic methods, network monitoring systems (IDS/IPS), VPN technologies, and security policies. This article examines the effectiveness and existing weaknesses of each technology. Cryptographic methods, such as AES and RSA algorithms, play an important role in protecting the network, but due to some threats and attacks, their effectiveness decreases over time. Although IDS/IPS systems are effective in detecting dangerous actions in the network, their high efficiency requires constant updating of the system. VPN technologies increase network security, but their use by some services without sufficient data encryption can pose a risk. The article emphasizes the importance of developing and implementing effective methodologies for ensuring network security.

Keywords

network security, cryptography, AES, RSA, IDS, IPS, VPN, network attacks, DDoS, network monitoring, technologies and risks.

PDF

References

  1. Ahmedov, J. A., & Qurbonov, M. (2020). Fundamentals of Information Technologies. Tashkent: Fan va Texnologiya.
  2. Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems (3rd ed.). Wiley.
  3. Berdiev, B. (2019). Computer Networks and Security Fundamentals. Tashkent: Iqtisodiyot.
  4. Kurose, J. F., & Ross, K. W. (2021). Computer Networking: A Top-Down Approach (8th ed.). Pearson.
  5. Law of the Republic of Uzbekistan. (2022, April 15). On Cybersecurity. No. O‘RQ-764.
  6. National Institute of Standards and Technology (NIST). (2020). Special Publication 800-207: Zero Trust Architecture. U.S. Department of Commerce.
  7. Stallings, W. (2022). Cryptography and Network Security: Principles and Practice (8th ed.). Pearson.
  8. Tanenbaum, A. S., & Wetherall, D. J. (2019). Computer Networks (6th ed.). Prentice Hall.
  9. IEEE Xplore Digital Library. (2024). Current Trends in Network Security and AI-driven Monitoring. [Online resource].
  10. Zimmermann, P. R. (2021). Post-Quantum Cryptography and the Future of Data Encryption. Journal of Cybersecurity and Hardware Defense.

Downloads

Download data is not yet available.