Abstract
Ushbu maqolada zamonaviy axborot tizimlari va kompyuter tarmoqlarida keng qo‘llaniladigan IDS (Intrusion Detection System) hamda IPS (Intrusion Prevention System) tizimlarining ishlash prinsiplari, asosiy turlari va ularning amaliy qo‘llanilishi tahlil qilinadi. Maqolada IDS/IPS tizimlarining signatura asosidagi, anomaliya asosidagi va stateful protocol analysis metodlari ilmiy manbalar asosida yoritilgan. Shuningdek, kiberhujumchilar tomonidan ushbu tizimlarni chetlab o‘tishda qo‘llaniladigan fragmentatsiya, payload obfuscation, timing attack va protocol ambiguity kabi aldash usullari keng tahlil qilingan. Zamonaviy himoya yondashuvlari sifatida deep packet inspection, traffic normalization hamda mashinaviy o‘rganish asosidagi aniqlash metodlarining samaradorligi ko‘rib chiqilgan. Tadqiqot natijalari IDS/IPS tizimlarining axborot xavfsizligini ta’minlashdagi muhim rolini hamda ularni muntazam takomillashtirish zarurligini ko‘rsatadi.
References
1. Scarfone, K., Mell, P. Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800-94. National Institute of Standards and Technology, 2007.
2. Yeo, L. H., Che, X. Understanding Modern Intrusion Detection Systems: A Survey. arXiv preprint, 2017.
3. Alsubhi, K., Alqahtani, S. Overview on Intrusion Detection Systems for Computers and Networks. Computers, 2025.
4. Gibbs, P. Intrusion Detection Evasion Techniques and Case Studies. GIAC Research Paper, SANS Institute, 2017.
5. Northcutt, S. Network Intrusion Detection: An Analyst’s Handbook. New Riders Publishing, 1999.
6. Bejtlich, R. The Practice of Network Security Monitoring: Understanding Incident Detection and Response. No Starch Press, 2013.
7. Endorf, C., Schultz, E., Mellander, J. Intrusion Detection and Prevention Systems. McGraw-Hill, 2004.
8. Cole, E. Network Security Bible. Wiley Publishing, 2011.
9. NIST. Computer Security Resource Center. Available at: https://csrc.nist.gov
10. OWASP. Open Web Application Security Project. Available at: https://owasp.org
11. SANS Institute. Available at: https://www.sans.org
12. Snort Official Documentation. Available at: https://www.snort.org
13. Suricata Documentation. Available at: https://suricata.io
14. Zeek Documentation. Available at: https://zeek.org