RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR

Authors

DOI:

https://doi.org/10.28925/2663-4023.2022.17.91111

Keywords:

DoS, DDoS, DDoS-attack, Internet, Internet resource, cyberwar, hybrid war.

Abstract

To date, information technologies have entered all the spheres of society. Due to the rapid development of scientific and technological progress, the traditional methods of introduction of wars, which are currently underway not only in the field of hostilities, but also in the cybernetic space of society, are also changing. The modern world is characterized by active wars in cyberspace, where one of the most common attacks is DDoS-attack, including critical infrastructure. This is primarily due to the extreme density of integration into the life and activities of the society of various gadgets, electronic devices and the Internet, the violation of which can cause significant damage - both psychological and significant damage to the enemy from the inside. One of the simplest and most popular methods for violating such normal functioning is the use of resource overload, which can even lead to their complete inaccessibility. One of the ways of overload is the use of DDoS-attacks in case of refusal of service. Mass sending external requests to the attacked resource leads to the fact that such a resource in a short period of time is trying to develop a significant number of requests, which will lead to a significant slowdown in its work or even lead to a complete stop of the resource. This work is devoted to the study of the methods by which DDoS-atack are carried out. The most common methods for their implementation and the main methods of protection against them are considered in detail. This work has examined in detail the technologies and methods of protection against DDoS attacks analyzed and relatively existing solutions of ready-made companies for protection. But since information technologies are developing rapidly, DDoS attacks will develop. Consequently, the problem of protection against them is relevant, especially in the conditions of cyber.

Downloads

Download data is not yet available.

References

Cyberattack for energy companies of Ukraine. https://uk.wikipedia.org/wiki/%%D0%9a%D1%96%D0%B1%B1%B5%D1%80%D0%B0%D1%82%D0%B0%B0%D0%BA%d0%b0_%d0%bd%d0%b0_%d0%d0%bd%d0%b5%d1%80%d0%b3%d0%b5%D1%82%d0%b8%d1%%%87%D0%BD%D1%96_%D0%BA%D0%D0%BC%D0%BF%D0%B0%D0%BD%D1%96%D1%97_%D0%A3%D0%BA%% D1%80%D0%B0%D1%97%D0%BD%D0%B8.

Methods for combating DOS or DDOS attacks. https://wiki.tntu.edu.ua/%D0%9C%D0%B5INGD1%80%D0%be%D1%82%D1%8C%D0%D0%B8_%D0%B7_DOS_%D0%D0%D0%D0%BE_DDOS_%D0%B0%D1%82%D0% B0%D0%BA%D0%B0%D0%BC%D0%B8.

Russian-Ukrainian cyberwar. https://en.wikipedia.org/wiki/wiki/%D0%A0%D0%BE%D1%81%D1%96%96,D0%be%D1%83%D0%BA%D1%80%D0%D1%97%D0%BD%D1%81%D1%8C%D0%BA%D0%B0_%D0%BA%D1%96%D0%B1%D0%D1%80%D0%B2%D1%96%D0%B9%D0%BD%D0%B.

DOS-Attack. https://en.wikipedia.org/wiki/dos-%D0%B0%D1%82%D0%B0%D0%BA%BA%D0%B0.

What is a DDOS-Attack? https://cip.gov.ua/en/news/sho-take-dos-ataka.

Service Provider Solutions. DDOS Protection Solution. Enabling “Clean Pipes” Capabilities. https://www.cisco.com/assets/cdc_content_elements/networking_solutions/service_provider/ddos_protection_sol/ddos_protection.pdf.

F5 nginx Plus. https://www.nginx.com/products/nginx/.

How does ddos Protection Work? https://datadome.co/learning-center/how-does-dos-protection-work/

Common Ddos Mitigation Methods and Comparison. https://www.mlytics.com/blog/common-ddos-mitigation-implementation-strategies-and-Comparison/.

CDN Security. What is a cdn? https://www.netacea.com/glossary/cdn-security/.

About the TCP-UDP-PROXY. https://www.watchGuard.com/help/docs/Help-center/en-us/content/en-en-us/fireware/ proxies/tcp/tcp_udp_proxy_abut_c.html.

What is Cloudflare and How does a cdn work? https://blog.101Domain.com/business-development/what-is-cloudflare-and-does-a-cdn-work.

What is the osi model? https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/

Susukailo, V., Opirskyy, I., Yaremko, O. (2022) Methodology of isms Establishment Against Modern Cybersecurity Threats. In: Klymash M., Beshley M., Luntovskyy A. (EDS) Future Incent-Based Networking. Lecture Notes in Electrical Engineering, 831. https://doi.org/10.1007/978-3-030-92435-5-5_15

Opirskyy, I.R., Vasylyshyn, S.I., Sukukailo, V.A. (2021). Cybercrime investigation with baits in the cloud environment. Information safety, 27(1), 13-20.

Downloads


Abstract views: 447

Published

2022-09-29

How to Cite

Laktionov, I., Kmit, A., Opirskyy, I., & Harasymchuk, O. (2022). RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR . Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(17), 91–111. https://doi.org/10.28925/2663-4023.2022.17.91111

Most read articles by the same author(s)

1 2 > >>