OLIY TA’LIM MUASSASALARI UCHUN AXBOROT XAVFSIZLIGI MONITORINGI DASTURIY TIZIMINI ISHLAB CHIQISH
Keywords:
axborot xavfsizligi, monitoring tizimi, oliy ta’lim, kiberxavfsizlik, SIEM, anomaliya aniqlash, tarmoq xavfsizligi, real vaqt tahlili, dasturiy ta’minot, ma’lumotlar tahlili.Abstract
Mazkur maqolada oliy ta’lim muassasalarida axborot xavfsizligini ta’minlash va samarali nazorat qilishga qaratilgan monitoring dasturiy tizimini ishlab chiqish masalalari yoritilgan. Tadqiqot jarayonida zamonaviy kiberxavfsizlik tahdidlari, jumladan ruxsatsiz kirish, zararli dasturiy ta’sirlar, ma’lumotlar sizib chiqishi va ichki xavf omillari tahlil qilindi
References
1. Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). National Institute of Standards and Technology.
2. Sommer, R., & Paxson, V. (2010). Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. IEEE Symposium on Security and Privacy.
3. Stallings, W. (2018). Computer Security: Principles and Practice (4th ed.). Pearson Education.
4. Mell, P., Boeckman, B., & Lipson, H. (2014). Analysis of SIEM technology capabilities. Journal of Information Security and Applications, 20, 78–89.
5. Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31.
6. Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1–58.
7. Bejtlich, R. (2013). The Practice of Network Security Monitoring: Understanding Incident Detection and Response. No Starch Press.
8. Ahmed, N., & Wallace, W. A. (2015). Machine learning paradigms for network traffic classification: A survey and comparison. Journal of Network and Computer Applications, 51, 97–108.
9. Zhang, Y., & Paxson, V. (2011). Detecting backdoors. IEEE Symposium on Security and Privacy.
10. Sommer, R., & Paxson, V. (2010). Machine learning in intrusion detection: Problems and challenges. ACM Transactions on Information and System Security, 10(4), 1–39.









