The Experiment about Providing the Security of the Network with the base of the Special Filtering of the Traffic

Similar documents
Method for security monitoring and special filtering traffic mode in info communication systems

IC32E - Pre-Instructional Survey

ESAP Release Notes

How To Remove Personal Antivirus Security Pro Virus

How To Remove Personal Antivirus Security Pro Virus Windows 8

1 Page Compass Investors, LLC P.O. Box 94 Kenilworth, IL

The use of the Spectral Properties of the Basis Splines in Problems of Signal Processing

Bitdefender GravityZone. Supreme protection against active threats for the SMB market

Get Max Internet Security where to buy software for students ]

Firewall Antivirus For Windows Xp Avast 2012 With Key

ESAP Release Notes

Comparison Of Antivirus Software

Configure Ftp In Windows 7 64 Bit Microsoft. Antivirus >>>CLICK HERE<<<

Free antivirus software download

A Review Paper on Network Security Attacks and Defences

TITLE FIELD OF THE INVENTION BACKGROUND OF THE INVENTION

Name of chapter & details.

How To Remove Virus From Computer Without Using Antivirus In Windows Xp

How To Removing Personal Antivirus Security Pro From Windows 8

ESAP Release Notes. ESAP and Junos Pulse Secure Access/Access Control Service Compatibility Chart:

How To Remove Xp Internet Security 2011 Virus Manually

Education Network Security

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

Seqrite Endpoint Security

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

ESAP Release Notes. ESAP and Junos Pulse Secure Access/Access Control Service Compatibility Chart:

Avast Anti Virus Manual Guide 2013 Full Version For Windows Xp

ESAP Release Notes. ESAP and Junos Pulse Secure Access/Access Control Service Compatibility Chart:

Cybersecurity Training

Scrutinizer Flow Analytics

Cyber security tips and self-assessment for business

Information Security Coding Rule Based on Neural Network and Greedy Algorithm and Application in Network Alarm Detection

Firewall Antivirus For Windows Xp Full Version 2013

Unable To Uninstall Avira Antivirus Error Code 7

ACM Retreat - Today s Topics:

How To Remove Personal Antivirus Security Pro From Registry

Manually Remove Of Xp Internet Security Pro Virus Windows 7

Pass Microsoft Exam

ESAP. Release Notes. Build. Published. June Document Version

Systems software. Definition. Categories of software. Examples Of Systems Software 11/23/2018

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

Security by Default: Enabling Transformation Through Cyber Resilience

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Avg Antivirus For Windows Xp Full Version 2013 With Key

IMPROVING THE RELEVANCY OF DOCUMENT SEARCH USING THE MULTI-TERM ADJACENCY KEYWORD-ORDER MODEL

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

Manually Remove Of Xp Internet Security Protect Virus Manually

Norton Internet Security 2012 Removal Tool For Windows 7

Getting Started with Cybersecurity

Schematic Antivirus 2013 For Windows Xp Full Version

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Volume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies

Schematic Antivirus 2013 For Windows 7 32 Bit

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

ESAP. Release Notes. Release, Build Published Document Version February

Manually Remove Of Xp Internet Security Pro 2013 Virus

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ALIENVAULT USM FOR AWS SOLUTION GUIDE

Schematic Antivirus 2013 For Windows 7 32 Bit

Schematic Antivirus Full Version 2012 For Xp With Key

Definition. A series of detailed instructions that control the operation of a computer system. are developed by computer programmers

SaaS Flyer for Trend Micro

How To Run Windows Update Manually Xp

Free antivirus software download windows 10

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Akshay Ravindra Bhasarkar 1, R. N. Mandavgane 2

Performance of data mining algorithms in unauthorized intrusion detection systems in computer networks

Recording end-users security events: A step towards increasing usability

The GenCyber Program. By Chris Ralph

ESAP. Release Notes Build. Oct Published. Document Version

J. Vilmsi Tallinn Estonia Flak Installation Guide

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

ESAP Release Notes. ESAP and Junos Pulse Secure Access/Access Control Service Compatibility Chart:

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

How To Delete Avira Antivirus From My >>>CLICK HERE<<<

HOW TO ANALYZE AND UNDERSTAND YOUR NETWORK

How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program

Selection of Best Web Site by Applying COPRAS-G method Bindu Madhuri.Ch #1, Anand Chandulal.J #2, Padmaja.M #3

ESAP. Release Notes. Release, Build Published Document Version December

Chapter 4: Implicit Error Detection

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

Network Security Issues and Cryptography

Combining TCP and UDP for Secure Data Transfer

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

International Journal of Computer Engineering and Applications,

Data-Driven Policing Summit

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Unit 2 Assignment 2. Software Utilities?

Networks & Communications. Comp 277

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1

PassMark S O F T W A R E

Step-by-Step Configuration

NUIT Tech Talk: Data and Information Security at Northwestern January 24, 2007

Avg Antivirus Manual Latest Version 2013 For Xp

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

Security Awareness Training June 2016

Transcription:

ISSN: 350-038 The Experiment about Providing the of the Network with the base of the Filtering of the Traffic Gulomov Sherzod Rajaboevich, Akhmedov Kodirjon Sokhibjon ugli Senior lecturer, Department of Providing Information, Tashkent University of Information Technology named after Muhammad al-khwarizmi, Uzbekistan Student, Department of Providing Information, Tashkent University of Information Technology named after Muhammad al-khwarizmi, Uzbekistan ABSTRACT. In this article packet processing scheme on special packet is offered. A special software packet in the computer networks that will allow protecting network traffic from external influences has been developed. From above experiments, identifying the probability of missing the suspicious enables to assess how it is secured from the outer impacts is defined. I. INTRODUCTION At present, in the world information processing, storage and transmission are developing intensively. The modern world has become digital. Currently, the following trends in the development and use of modern information technology (IT) are observed: complication of computer system software; collection and storage of large information databases on electronic media; direct access to the resources of the computer system of a large number of users of different categories and with different access rights in the system; combining in the general information array of different access methods; increase the cost of resources of computer systems; the use by most public and private organizations of special anti-virus programs as a means of security; extensive use of the, etc. The use of information technology requires attention to information security. Unauthorized use of information resources, unauthorized access or infringement of information security causes serious problems for citizens, social groups, companies and states. Therefore, it is important to develop efficient methods and algorithms for special traffic, which protects computer networks against unauthorized use and remains a problem of theoretical and practical problem, which is of national importance. II. THE EXPERIMENT ABOUT THE PROBABILITY OF MISSING SUSPICIOUS PACKETS Let s say x 1 is the source which characters through IP addresses and x is the source which characters usage from through ports. x 1 = 1, Usage from towards IP addresses; x 1 = 1, Disuse from towards IP addresses; x = 1, Usage from towards ports; x = 1, Disuse from towards ports. After that p = (x 1 ), (x ) it will be determined probability of missing suspicious packets. p = (x 1, x ) must be marked as the probability of missing suspicious packets [1,]. The model object of the experiment p = (x 1, x ) = b 0 + b 1 x 1 + b x + b 3 x 1 x polygon can be used as an analytic model. In the experiment, 1000 type of TPC packet s generation will be modeled through IP addresses and ports. Fig.1.1 illustrates that there is no results through IP addresses and ports, namely, (x 1 = 1, x = 1) sources will receive the same symbols, and the probability of missing the suspicious packets will be equal to p = 0,47. Copyright to IJARSET www.ijarset.com 4679

ISSN: 350-038 Fig.1.1. There is no results through IP addresses and ports. Fig.1. illustrates that there is no through IP addresses and it is shown that through ports there is existence and a results of towards ports, namely, (x 1 = 1, x = 1) sources will receive several symbols and the probability of missing the suspicious packets will be equal to p = 0,33. Fig.1.. There is no towards IP addresses and it is shown that through ports there is existence and results of towards ports. Fig.1.3 illustrates there is existence of through IP addresses and there is no through Ports namely (x 1 = 1, x = 1) sources will receive different symbols and the probability of missing the packets is equal to p = 0.3. Fig.1.3. There is an existence of through IP addresses and there is no through ports. Copyright to IJARSET www.ijarset.com 4680

ISSN: 350-038 Fig.1.4. shows that there is a existence in both IP addresses and ports, namely (x 1 = 1, x = 1) will receive the same symbols and the probability of missing the suspicious packets is equal to p = 0,9 Fig.1.4. There is an existence of through IP addresses and there is through ports. Table 1 shows the values of the IP addresses and ports. Table 1.1: Values for IP addresses and ports Sources Experiments x 1 x p i = (x 1, x ) There is towards both IP addresses and ports. -1-1 p 1 = (0,47) There is no towards IP addresses and there is existence of towards ports. -1 1 p = (0,33) There is existence of towards IP addresses and there is no towards ports. 1-1 p 3 = (0,3) There is no in both IP addresses and ports. 1 1 p 4 = (0,9) For the experiment that has been done, the linear equation system can be seen like this: b 0, b 1, b, b 3 model parameters: p 1 = b 0 + b 1 ( 1) + b ( 1) + b 3 (1) = 0,47 p = b 0 + b 1 ( 1) + b (1) + b 3 ( 1) = 0,33 p 3 = b 0 + b 1 (1) + b ( 1) + b 3 ( 1) = 0,3 { p 4 = b 0 + b 1 (1) + b (1) + b 3 (1) = 0,9 Below it is described the solution to linear equation system with Matrix and Gauss methods. 1 1 1 1 0,47 1 0 0 0 0,35 1 1 1 1 0,33 0 1 0 0 0,04 ( ) = ( ) 1 1 1 1 0,3 0 0 1 0 0,04 1 1 1 1 0,9 0 0 0 1 0,0 As results we can get these values: b 0 = 0,35; b 1 = 0,04; b = 0,04; b 3 = 0,0. a 1 Filtering towards IP addresses x 1 the main advantage of factor. a Filtering towards Ports x the main advantage of factor. Considering the experiments of factors formulas, we can write followings: a 1 = (p 3 p 1 ) + (p 4 p ) (0,3 0,47) + (0,9 0,33) = = 0,095 a = (p p 1 ) + (p 4 p 3 ) (0,33 0,47) + (0,9 0,3) = = 0,085 It is known from the formula that, factor of towards IP addresses has greater value than factor of towards ports. Copyright to IJARSET www.ijarset.com 4681

The number of packets ISSN: 350-038 III. ASSESSMENT TO WORK OF THE SPECIAL SOFTWARE PACKET FILTERING software packet and SSP modules which have the higher surface around networking imitation model of the screen is conducted in web page creating Stylemix company in Tashkent: Entering packets with working the rule of exponential for each interface comes with 100 Mbit/sec speed to networking map of the interface. The smallest measurement of packets is 64 byte. For receiving the buffer packets is 48 kilobyte. In the table 1., it was shown about special software packet and SSP modules that has higher level in networking screen s filtered and number of filtered entering packets. software packet and SSP modules which have the higher surface is filtered or not filtered. Table 1.: Number of entry packets software packet SSP modules which have the higher surface Number of entry packets 1000 1000 Filtered packets numbers 990 984 Not filtered packets numbers 10 16 Fig.1.5 describes special software packet and SSP modules which have the higher surface filtered and not filtered number of entry packets diagram of the. It can certainly be seen that, number of entry packets consists special software packet has SSP model with higher surface is used mostly and this helps to decrease the outer threats on network traffic [3]. 1,00 1,000 800 600 400 00 0 0.00 100.00 00.00 300.00 400.00 500.00 600.00 Filtered packets numbers of special software packet Not filtered packets numbers of special software packet Filtered packets numbers of SSP modules which have the higher surface Not filtered packets numbers of SSP modules which have the higher surface Time (mks) Fig.1.5. software packet and SSP modules which have the higher surface and filtered and not filtered number of entry packets diagram of the. IV. ASSESSMENT OF THE SPECIAL SOFTWARE PACKET FILTERING WITH OTHER FIREWALLS software packet for the different personal working with s for assessment we will look through the row value of the. A = the main functions of the. Here: A 1 = Proportional scanning/; A = Proportional blocking; A 3 = blocking input/output ports; A 4 = virtual private network (concealing IP and MAC addresses). Providing the higher level of the security. A 5 = client-server architecture. Copyright to IJARSET www.ijarset.com 468

ISSN: 350-038 B = the additional functions of the. B = B 1, B, B 3, B 4, B 5, B 6, B 7, B 8 Here, B 1 = Anti-phishing. B = Antivirus. B 3 = Anti spy. B 4 = Monitoring of the current connections. B 5 = Identifying suspicious packets B 6 = Incidence journal B 7 = Controlling the pages which the network can use. C = Compatibility of the. C = C 1, C, C 3, C 4, C 5 Here, C 1 = Windows 10; C = Windows 8; C 3 = Windows 7; C 4 = Windows Vista; C 5 = Windows XP. Table 1.3 shows that special software packet in different personal s and the comparative analysis on that [4]. Fig.1.6 illustrates histogram of that comparative analysis. Table 1.3: software packet in different personal s and the comparative analysis of them Rank A A 1 Private screen in networking Total evaluation Assessment software packet Avast AVG Pro Zone Alarm Free 3 3 3 3 3 3 3 3 A A 3 0 4 4 4 4 4 4 4 4 A 4 5 5 5 0 0 0 0 5 A 5 6 6 0 0 0 0 0 0 Total 0 14 9 9 9 9 14 B B 1 3 0 3 3 3 0 3 3 B 3 3 3 3 3 0 3 3 B 3 3 0 3 3 3 0 3 0 B 4 4 4 4 0 0 0 0 0 0 B 5 4 4 0 0 4 4 4 4 B 6 3 3 3 3 3 3 3 3 B 7 4 4 4 0 0 0 0 0 Total 18 16 1 16 7 16 13 C C 1 3 3 3 3 3 3 3 3 C 3 3 3 3 3 3 3 3 C 3 15 3 3 3 3 3 3 3 3 C 4 3 3 3 3 3 3 3 3 C 5 3 3 3 3 3 3 3 3 Total 15 15 15 15 15 15 15 Kerio Winroute Copyright to IJARSET www.ijarset.com 4683

Overall rating 5 ISSN: 350-038 0 The main functions of the 15 10 The addition functions of the 5 Compatibility of the 0 software packet Avast AVG Pro Zone Alarm Free Kerio Winroute Personal s Fig.1.6. software packet in different s assessment of that work and histogram of that comparative analysis Here: A U Effectiveness relation with different functions of s. A U = A 1 + A + A 3 + A 4 + A 5 B U Effectiveness relation with different additional functions of s: B U = B 1 + B + B 3 + B 4 + B 5 + B 6 + B 7 C U Effectiveness relation in several s and suitability to each other and relation to functions: C U = C 1 + C + C 3 + C 4 + C 5 S Overall productivity S = A U + B U + C U S max Maximal productivity: S max = A max + B max + C max According to the result of the 1.3 table: S max = A max + B max + C max = 0 + 4 + 15 = 59 U(%) productivity: U = S S max 100% In table 1.4 shows the working effectiveness assessment of special software packet in different personal s [5,6]. Fig.1.7 shows that histogram of the comparative analysis. Copyright to IJARSET www.ijarset.com 4684

Productivity U(%) Rank ISSN: 350-038 Table 1.4: The result of effectiveness assessment of special software packet in different personal s Private screen in networking software packet Avast AVG Pro Zone Alarm Free S 53 45 36 40 31 40 4 S max 59 59 59 59 59 59 59 Kerio Winroute U(%) 89,830 76,71 61,016 67,796 5,54 67,796 71,186 100 90 80 70 60 50 89.83 76.7 61.0 67.80 5.54 67.80 71.19 40 30 0 10 0 software packet Avast AVG Pro Zone Alarm Free Kerio Winroute Personal s Fig.1.7. The result of effectiveness assessment of special software packet in different personal s. V. CONCLUSION The customized special software packet provides a high level of protection for network traffic over external influences and allows you to control traffic on remote PCs that are not available on any individual s. Moreover, software packet special has effectiveness of 13 % from the most effective assessment of productivity and the least effective assessment is Pro has 37 % productivity of the personal s. REFERENCES [1]. Behrouz A. Forouzan. Data communications and networking fourth edition. Publisher: McGraw Hill. 007. pp.1171. []. Gulomov Sh.R., Nasrullaev N.B., Yusupov B.K. Tools of protection functioning info communication networks from external attacks. TUIT xabarlari journal. 4(3) 014, pp.16-4. [3]. Gulomov Sh.R., Abdurakhmanov A.A., Nasrullaev N.B. Design Method and Monitoring Traffic Filtering under Developing «Electronic Government». International Journal of Emerging Technology & Advanced Engineering (ISSN 50-459, ISO 9001:008 Certified Journal), Volume 5, Issue 1, January, 015, India, pp.66-73. [4]. Karimov M.M., Ganiev A.A., Gulomov Sh.R. Settings firewalls to implement special mode. Vestnik TSTU, 015, 1 (89), pp.14-1. [5]. Karimov M.M., Gulomov Sh.R., Yusupov B.K. Approach Development Accelerate of Process Traffic Filtering. Journal of Computer and Communications, Vol.3 No.9, September 015, USA pp.68-8. [6]. Gulomov Sh.R., Rakhmanova G.S., Boymurodov B.E. Ensuring Secure Info-Communication Networks Based on the Filtering Mode. International Journal of Engineering Innovation & Research Volume 5, Issue 1, ISSN: 77 5668, 016, India, pp.16-3. Copyright to IJARSET www.ijarset.com 4685