SYSTEMATIC DETECTION AND CLASSIFICATION OF ATTACK TRACES IN COMPUTER NETWORKS BY TYPE

Authors

  • Sadirova Xursanoy TATU FF
  • Rasuljon Raxmatov

Keywords:

. Tarmoq hujumlari; kiberxavfsizlik; tarmoq monitoringi; IDS; DDoS; man-in-the-middle; phishing; spoofing; port skanerlash; zero-day; ARP zaharlash; imzo asosidagi aniqlash; anomaliya asosidagi aniqlash.

Abstract

This article provides a systematic analysis of the types of cyberattacks targeting computer networks and the methods used to detect their traces within network traffic. The attacks are categorized into DDoS, man-in-the-middle (MitM), phishing, spoofing, port scanning, zero-day, and ARP poisoning. The characteristics of each type and their respective detection techniques are examined. The main focus is on Intrusion Detection Systems (IDS), network traffic analysis, and monitoring. The strengths and limitations of signature-based and anomaly-based (statistical) detection methods are discussed. The article also presents practical detection techniques using tools such as Wireshark, Snort, Suricata, and Zeek.

References

N. ZAGORODNA, M. STADNYK, B. LYPA, M. GAVRYLOV, and R. KOZAK, “Network Attack Detection Using Machine Learning Methods,” Challenges to national defence in contemporary geopolitical situation, vol. 2022, no. 1, pp. 55–61, Nov. 2022, doi: 10.47459/cndcgs.2022.7.

S. Bozorov, “DDoS Attack Detection via IDS: Open Challenges and Problems,” 2021. doi: 10.1109/ICISCT52966.2021.9670260.

R. Amrish, K. Bavapriyan, V. Gopinaath, A. Jawahar, and C. Vinoth Kumar, “DDoS Detection using Machine Learning Techniques,” Journal of ISMAC, vol. 4, no. 1, pp. 24–32, May 2022, doi: 10.36548/jismac.2022.1.003.

T. Kim and W. Pak, “Early Detection of Network Intrusions Using a GAN Based One-Class Classifier,” IEEE Access, vol. 10, pp. 119357–119367, 2022, doi: 10.1109/ACCESS.2022.3221400.

I. Sumaiya Thaseen, B. Poorva, and P. S. Ushasree, “Network Intrusion Detection using Machine Learning Techniques,” in 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), IEEE, Feb. 2020, pp. 1–7. doi: 10.1109/ic-ETITE47903.2020.148.

Мухтаров, Ф. (2023). Обеспечение более безопасного цифрового будущего, важность образования в области кибербезопасности. Информатика и инженерные технологии, 1(1), 46-49.

Sadirova, X. X. (2025). IDS ORQALI TARMOQDA BO ‘LADIGAN HUJUMLARNI AQINLASH USULLARI VA TAHLILI. Miasto Przyszłości, 56, 298-302.

Turdimatov, M., Xusanova, M., Sadirova, X., Abdurakhmonov, S., & Bilolov, I. (2024, November). On the method of approximation and quantization of information transmission through communication channels. In E3S Web of Conferences (Vol. 508, p. 03007). EDP Sciences.

Sadirova, X., & Ergasheva, A. (2023). AXBOROTNING MAXFIYLIGINI, YAXLITLIGINI VA FOYDALANUVCHANLIGINI BUZISH USULLARI. Engineering problems and innovations.

Published

2025-05-29

How to Cite

Xursanoy, S., & Raxmatov, R. (2025). SYSTEMATIC DETECTION AND CLASSIFICATION OF ATTACK TRACES IN COMPUTER NETWORKS BY TYPE. The Descendants of Al-Fargani, (2), 40–44. Retrieved from http://al-fargoniy.uz/index.php/journal/article/view/824