CYBER ATTACKS AND THEIR METHODS OF EXECUTION

Authors

  • Dilshoda Qurbonaliyeva TUIT

Keywords:

Cyber ​​Attack, Active Attack, Passive Attack, MITM, DDoS, Sniffing, Phishing, Key Logging, FireWall, IPS, IDS, Honeypot

Abstract

The article analyzes the types of cyber attacks, methods of their implementation and protection measures in connection with the development of modern information and communication technologies. The main motives of cybercriminals, the goals of attacks and cybersecurity methods are covered in detail. The article presents the classification of cyber attacks based on the analysis of scientific literature and proposes strategies to protect against them. The purpose of this research is to develop effective defense measures in the field of cybersecurity and information systems protection.

References

S Bozorov, N Akhmedova, D Qurbonaliyeva, K Gultekin, Survey on honeypot: Detection, countermeasures and future with MI. AIP Conference Proceedings, 2024. doi.org/10.1063/5.0242098

Z.T.Xudoyqulov, D.V.Qurbonaliyeva, S.M.Bozorov, Honeypot texnologiyasining funksional imkoniyatlarini tadqiq etish - Al-Farg'oniy avlodlari, 2024.

N. Hoque, M.H. Bhuyan, R.C. Baishya, D.K. Bhattacharyya, J.K. Kalita, Network attacks: Taxonomy, tools and systems, 2014, Journal of Network and Computer Applications, p.307-324, doi: 10.1016/j.jnca.2013.08.001;

Dilshoda Qurbonaliyeva, Gulnora Abduraxmanova, Analysis of Methods of Attracting Attackers in the Honeypot. ICFNDS’24 Conference Proceedings, 2024. doi:10.1145/3726122.3726253

R.P. van Heerden, B. Irwin, I.D. Burke va L. Leenen, Description of a Network Attack Ontology Presented Formally, 2021, Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities, p 343–368, doi: 10.1007/978-3-030-72236-4_14;

M. Raunds, N. Pentgraft, Diversity in Network Attacker Motivation: A Literature Review, 2009, International Conference on Computational Science and Engineering, doi: 10.1109/CSE.2009.178.;

M. Agarwal, K. S. Gill, R. Chauhan, A. Kapruwan, D. Banerjee, 2024, 3rd International Conference for Innovation in Technology (INOCON), doi: 10.1109/INOCON60754.2024.10512250;

R. Ding, L. Sun, W. Zang, L. Dai, Z. Ding, B. Xu, Towards universal and transferable adversarial attacks against network traffic classification, 2024, Journal of Computer Networks, doi: 10.1016/j.comnet.2024.110790;

B. Dorsemaine, J.P. Gaulier, J.P Wary, N. Kheir, P. Urien, Internet of Things: A Definition and Taxonomy, In Proceedings of the 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, Cambridge, UK, 9–11 September 2015. doi: 10.1109/NGMAST.2015.71

Z. Doffman, Cyberattacks On IOT Devices Surge 300%, 2019, Measured in Billions.

World internet stats. Number of world Internet users on 30 June 2018. Available at: http://www.internetworldstats.com/stats.htm, [Accessed 20 June 2018].

Cavalcante, R. C., I. I. Bittencourt, A. P. Silva, M. Silva, E. Costa and R. A Survey of Security in MultiAgent Systems. Expert Systems with Applications. 2016. (39): 4835-4846.

K. Scarfone and P. Mell, ”Guide to Intrusion Detection and Prevention Systems (IDPS),” Gaithersburg, MD, Rep. NIST Special Publication 800-94,Feb. 2007.

D. Rozenblum, “Understanding Intrusion Detection System,” www.sans.org/reading_room/whitepapers/detection/understanding-intrusiondetection-systems_337, October 31, 2003.

S. Nassar, A.E. Sayed, N. Aiad, “Improve the Network Performance By using Parallel Firewalls,” in Proc. of 6th International Conference on Networked Computing, May 2010, pp. 1-5.

Published

2025-09-18

How to Cite

Qurbonaliyeva, D. (2025). CYBER ATTACKS AND THEIR METHODS OF EXECUTION. The Descendants of Al-Fargani, (3), 51–55. Retrieved from https://al-fargoniy.uz/index.php/journal/article/view/880

Most read articles by the same author(s)