METHOD AND ALGORITHM FOR DETECTING NETWORK ATTACKS ON THE DISTRIBUTED DATABASE OF CORPORATE NETWORK USERS

dc.contributor.authorSadikov Sh.M.
dc.date.accessioned2025-12-28T19:22:11Z
dc.date.issued2023-08-20
dc.description.abstractThe article identifies network attacks on the distributed database of corporate network users, researches the effects of external and internal threats within the organization's information system, and analyzes effective protection measures against network attacks on the database. A partition scheme has been developed in the area section of the distributed database, and an algorithm for detecting SQL injection attacks on the distributed database has been developed.
dc.formatapplication/pdf
dc.identifier.urihttps://ejird.journalspark.org/index.php/ejird/article/view/738
dc.identifier.urihttps://asianeducationindex.com/handle/123456789/11862
dc.language.isoeng
dc.publisherJournal Park Publishing
dc.relationhttps://ejird.journalspark.org/index.php/ejird/article/view/738/689
dc.sourceEuropean Journal of Interdisciplinary Research and Development ; Vol. 18 (2023); 111-120
dc.source2720-5746
dc.subjectcorporate network, distributed database, SQL injection, comparison matrix, risk, OTP.
dc.titleMETHOD AND ALGORITHM FOR DETECTING NETWORK ATTACKS ON THE DISTRIBUTED DATABASE OF CORPORATE NETWORK USERS
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Article

item.page.files

item.page.filesection.original.bundle

pagination.showing.labelpagination.showing.detail
loading.default
thumbnail.default.alt
item.page.filesection.name
shm_2023_method_and_algorithm_for_detecting_netwo.pdf
item.page.filesection.size
524.43 KB
item.page.filesection.format
Adobe Portable Document Format

item.page.collections