Preview

Bulletin of Shakarim University. Technical Sciences

Advanced search

RESEARCH OF KEY DIRECTIONS, PRINCIPLES, AND METHODS OF INFORMATION PROTECTION IN COMPUTER NETWORKS

https://doi.org/10.53360/2788-7995-2025-2(18)-12

Abstract

In today's world, technology is developing rapidly, and the number of online threats is increasing, making data protection one of the main priorities. This article provides an overview of key areas, methods, and tools for information security in computer networks. The theoretical part examines the main methods of information protection, including data encryption, attack detection systems, identity verification techniques, and access control methods. The practical part of the article includes a quantitative analysis of scientific studies on data protection in computer networks using the Bibliometrix program. The obtained results help identify the most significant studies, authors, and key trends, providing a better understanding of the current state and future prospects of this field. Graphs, tables, and diagrams in the article help visually present information and highlight the most important aspects of the research. Based on the conducted analysis, current trends and directions in information security were identified, helping to understand how technologies are evolving and which trends are crucial for ensuring the security of computer networks in the face of growing threats. Additionally, the article examines issues related to cyber threats, attacks on critical systems, and methods for their prevention.

About the Authors

V. S. Sharov
L.N. Gumilyov Eurasian National University
Kazakhstan

Vadim Sergeevich Sharov – Master’s student in the specialty «Information Security Systems», 

010000, Astana, Satpayev Str., 2



N. N. Tashatov
L.N. Gumilyov Eurasian National University
Kazakhstan

Nurlan Narkenovich Tashatov – associate professor of the department of Information Security,

010000, Astana, Satpayev Str., 2



A. K. Shaikhanova
L.N. Gumilyov Eurasian National University
Kazakhstan

Aigul Kairulayevna Shaykhanova – professor of the department of Information Security,

010000, Astana, Satpayev Str., 2



References

1. Alsafwani N. Strategic approaches in network communication and information security risk assessment / N. Alsafwani, Y. Fazea, F. Alnajjar // Information. – 2024. – Vol. 15, № 6. – P. 353.

2. Alharbi F. Empowering network security through advanced analysis of malware samples: Leveraging system metrics and network log data for informed decision-making / F. Alharbi, G.S. Kashyap // International Journal of Network Distributed Computing. – 2024. – Vol. 12. – P. 250-264.

3. Detection and characterization of DDoS attacks using time-based features / J. Halladay et al // IEEE Access. – 2022. – Vol. 10. – P. 49794-49807.

4. Phishing feedback: Just-in-time intervention improves online security / S. Bender et al // Behavioural Public Policy. – 2024. – P. 1-13.

5. Social engineering attacks prevention: A systematic literature review / W/ Syafitri et al // IEEE Access. – 2022. – Vol. 10. – P. 39325-39343.

6. Understanding data breach from a global perspective: Incident visualization and data protection law review / G. Pimenta Rodrigues et al // Data. – 2024. – Vol. 9, № 2. – P. 27.

7. Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: A review / N.H.A. Mutalib et al // Artificial Intelligence Review. – 2024. – Vol. 57. – P. 297.

8. Threat intelligence sharing community: A countermeasure against advanced persistent threat / S. Chandel et al // IEEE Conference on Multimedia Information Processing and Retrieval (MIPR). – 2019. – P. 353-359.

9. A systematic literature review for authorization and access control: Definitions, strategies, and models / A.K.Y.S. Mohamed et al // International Journal of Web Information Systems. – 2022. – Vol. 18, № 2/3. – P. 156-180.

10. Itodo C. Multivocal literature review on zero-trust security implementation / C. Itodo, M. Ozer // Computers & Security. – 2024. – Vol. 141. – P. 103827.

11. Revolutionizing SIEM security: An innovative correlation engine design for multi-layered attack detection / M. Sheeraz et al // Sensors. – 2024. – Vol. 24, № 15. – P. 4901.

12. Pavithra C. A comprehensive classification approach by integrating principal component analysis and support vector machines for advanced intrusion detection systems / C. Pavithra, М. Saradha // SN COMPUT. SCI. – 2024. – Vol. 5. – P. 996.


Review

For citations:


Sharov V.S., Tashatov N.N., Shaikhanova A.K. RESEARCH OF KEY DIRECTIONS, PRINCIPLES, AND METHODS OF INFORMATION PROTECTION IN COMPUTER NETWORKS. Bulletin of Shakarim University. Technical Sciences. 2025;(2(18)):102-108. (In Russ.) https://doi.org/10.53360/2788-7995-2025-2(18)-12

Views: 2


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2788-7995 (Print)
ISSN 3006-0524 (Online)
X