3. Articles and Papers
Permanent URI for this collection
Browse
Browsing 3. Articles and Papers by Author "Abdinurova N."
Now showing 1 - 5 of 5
Results Per Page
Sort Options
Item ANALYSIS OF QUANTUM CRYPTOGRAPHY AND TECHNOLOGIES IN INDUSTRIES(СДУ хабаршысы - 2020, 2020) Habiburahman Sh.; Baimuratov O. ; Abdinurova N.Abstract. In today’s connected world it’s crucial to make sure telecommunication is not a risk. Eavesdroppers will always find a way to attack and harm big companies systems or governmental databases. It’s very important to find the best possible way to keep our services safe. Quantum cryptography is one the best way since it’s based on rules of quantum physics. In this paper we are going to analyse the best solutions, protocols and different aspects of encryption. Real life implementations by different IT companies and investors will also be included in this paper. Weakness and pros always exist in every system and it’s impossible to indicate the system we are proposing is not breakable but it’s going to be the best possible solution for now. Why? It’s going to be discussed in later sections.Item COMPARATIVE ANALYSIS OF CLASSICAL MESSAGE FLOW AND INTEGRATION OF QUANTUM TECHNOLOGIES INTO MESSAGE TRANSMISSION USING QISKIT LIBRARY(СДУ хабаршысы - 2021, 2021) Abdinurova N. ; Mukhamed Y. ; Demeuov D.Abstract. The issue of secure connectivity is becoming increasingly common these days. Practically all encryption methods can be hacked, prompting the development of a data transport that is impenetrable. This scientific paper discussed the way of classic transmission of information and integration of quantum technologies into this network in order to increase the safety of the channel. This paper includes information about work done on research, such as learning principles of quantum cryptography technologies, basic logical gates and key terms such as superposition, entanglement and teleportation. Qubits are formed and exchanged between 2 parts of the Local Area Network (LAN) using Qiskit library. 2 protocols of data transmission: classic and quantum have been analyzed and compared.Item FEATURES AND ADVANTAGES OF VECTOR SPACE MODEL IN SEARCH ENGINE DESIGN(СДУ хабаршысы - 2018, 2018) Abdinurova N. ; Talаsbek A. ; Tolebi G.Abstract. This paper is dedicated to present a design of our project - search engine, which based on one of retrieval models, which have been deeply learned and selected among the several searching models in previous wellknown researches. We have explained couple of reasons for choosing certain model, its properties, some advantages, and techniques used to calculate document’s relevance to our information need. The principles of ranking algorithm had been interpreted, and the formula for calculating similarity depending on vector values of terms is shown in the part with techniques explication. In conclusion part some benefits of given model are listed and a definite derivation have been drawn.Item MITM. WHAT IS IT, HOW TO PROTECT YOURSELF AND IMPLEMENTATION FOR INSTRUCTIONAL USE(СДУ хабаршысы - 2021, 2021) Abdinurova N. ; Akmyrza D. ; Mirash A.Abstract. This is an attack in which a cybercriminal intercepts data while it is being transmitted. Man-in-the-Middle attacks are a common type of cybersecurity attack that allows attackers to eavesdrop on communications between two targets. This article discusses how people can protect themselves, what they need to know, and how an attacker performs a MITM attack using the open-source tools bettercap and net-creds in kali Linux. Buttercup is a network attack and monitoring program that can perform ARP spoofing and sniffing. Netcreds is a sniffing tool available by cloning on Github. This article attempts to implement this attack for instructional use.Item VULNERABILITIES IN CI-PLATFORMS THAT CAN BE EXPLOITED FOR CRYPTOCURRENCY MINING AND POSSIBLE SOLUTIONS TO THIS PROBLEM(СДУ хабаршысы - 2021, 2021) Abdinurova N. ; Sokitbayev M. ; Suyerbassov T. ; Baimolda A.Abstract. The topic of how vulnerabilities on Cl-platforms that are subject to cryptocurrency mining is relevant. One solution is that the github has manually set the commit confirmation so that the cryptominer cannot automate mining.