Hardware, software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks"
Objective. The article discusses hardware and software methods of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks"; the essence of which is to intercept data that is delivered within the observed system in the form of...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
Dagestan State Technical University
2022-11-01
|
| Series: | Вестник Дагестанского государственного технического университета: Технические науки |
| Subjects: | |
| Online Access: | https://vestnik.dgtu.ru/jour/article/view/1121 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849250115345186816 |
|---|---|
| author | A. R. Gazizov |
| author_facet | A. R. Gazizov |
| author_sort | A. R. Gazizov |
| collection | DOAJ |
| description | Objective. The article discusses hardware and software methods of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks"; the essence of which is to intercept data that is delivered within the observed system in the form of packets.Method. The analysis of the security of resources by the personal data information system regarding unauthorized access to data by means of "sniffing attacks" includes five conditional stages: collecting information in the personal data information system, scanning the personal data information system, gaining access to the personal data information system, securing personal data in the information system, generating a report; at the same time, security analysis it is always associated with unauthorized access to data.Result. To prevent unauthorized access to data by means of "sniffing attacks", the following software and hardware solutions are proposed to minimize the consequences of unauthorized exposure to the personal data information system: the use of the HTTPS protocol, a secure version of the HTTP protocol; the use of a static ARP table generated manually; scanning of the computer network of the personal data information system by the AntiSniff program; encryption of the computer network traffic networks of the personal data information system.Conclusion.The presented hardware and software solutions allow minimizing the consequences of unauthorized impact on personal data information systems. |
| format | Article |
| id | doaj-art-e23aac66d5b54641ae575f0a18a34ada |
| institution | Kabale University |
| issn | 2073-6185 2542-095X |
| language | Russian |
| publishDate | 2022-11-01 |
| publisher | Dagestan State Technical University |
| record_format | Article |
| series | Вестник Дагестанского государственного технического университета: Технические науки |
| spelling | doaj-art-e23aac66d5b54641ae575f0a18a34ada2025-08-20T03:57:21ZrusDagestan State Technical UniversityВестник Дагестанского государственного технического университета: Технические науки2073-61852542-095X2022-11-01493526010.21822/2073-6185-2022-49-3-52-60717Hardware, software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks"A. R. Gazizov0Don State Technical UniversityObjective. The article discusses hardware and software methods of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks"; the essence of which is to intercept data that is delivered within the observed system in the form of packets.Method. The analysis of the security of resources by the personal data information system regarding unauthorized access to data by means of "sniffing attacks" includes five conditional stages: collecting information in the personal data information system, scanning the personal data information system, gaining access to the personal data information system, securing personal data in the information system, generating a report; at the same time, security analysis it is always associated with unauthorized access to data.Result. To prevent unauthorized access to data by means of "sniffing attacks", the following software and hardware solutions are proposed to minimize the consequences of unauthorized exposure to the personal data information system: the use of the HTTPS protocol, a secure version of the HTTP protocol; the use of a static ARP table generated manually; scanning of the computer network of the personal data information system by the AntiSniff program; encryption of the computer network traffic networks of the personal data information system.Conclusion.The presented hardware and software solutions allow minimizing the consequences of unauthorized impact on personal data information systems.https://vestnik.dgtu.ru/jour/article/view/1121security analysisactive traffic interceptionresource securityanchoring in the systeminformation systempassive traffic interceptionpersonal dataaccessinformation collectionsniffing attackscanningresource protection toolsreport generationanalysis stages |
| spellingShingle | A. R. Gazizov Hardware, software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks" Вестник Дагестанского государственного технического университета: Технические науки security analysis active traffic interception resource security anchoring in the system information system passive traffic interception personal data access information collection sniffing attack scanning resource protection tools report generation analysis stages |
| title | Hardware, software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks" |
| title_full | Hardware, software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks" |
| title_fullStr | Hardware, software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks" |
| title_full_unstemmed | Hardware, software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks" |
| title_short | Hardware, software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks" |
| title_sort | hardware software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of sniffing attacks |
| topic | security analysis active traffic interception resource security anchoring in the system information system passive traffic interception personal data access information collection sniffing attack scanning resource protection tools report generation analysis stages |
| url | https://vestnik.dgtu.ru/jour/article/view/1121 |
| work_keys_str_mv | AT argazizov hardwaresoftwareandorganizationalmeansofprotectingtheresourcesofthepersonaldatainformationsystemfromunauthorizedaccessbymeansofsniffingattacks |