Search Results

Now showing 1 - 3 of 3
  • ItemOpen Access
    VULNERABILITIES IN CI-PLATFORMS THAT CAN BE EXPLOITED FOR CRYPTOCURRENCY MINING AND POSSIBLE SOLUTIONS TO THIS PROBLEM
    (СДУ хабаршысы - 2021, 2021) Abdinurova N. ; Sokitbayev M. ; Suyerbassov T. ; Baimolda A.
    Abstract. The topic of how vulnerabilities on Cl-platforms that are subject to cryptocurrency mining is relevant. One solution is that the github has manually set the commit confirmation so that the cryptominer cannot automate mining.
  • ItemOpen Access
    FEATURES AND ADVANTAGES OF VECTOR SPACE MODEL IN SEARCH ENGINE DESIGN
    (СДУ хабаршысы - 2018, 2018) Abdinurova N. ; Talаsbek A. ; Tolebi G.
    Abstract. This paper is dedicated to present a design of our project - search engine, which based on one of retrieval models, which have been deeply learned and selected among the several searching models in previous wellknown researches. We have explained couple of reasons for choosing certain model, its properties, some advantages, and techniques used to calculate document’s relevance to our information need. The principles of ranking algorithm had been interpreted, and the formula for calculating similarity depending on vector values of terms is shown in the part with techniques explication. In conclusion part some benefits of given model are listed and a definite derivation have been drawn.
  • ItemOpen Access
    MITM. WHAT IS IT, HOW TO PROTECT YOURSELF AND IMPLEMENTATION FOR INSTRUCTIONAL USE
    (СДУ хабаршысы - 2021, 2021) Abdinurova N. ; Akmyrza D. ; Mirash A.
    Abstract. This is an attack in which a cybercriminal intercepts data while it is being transmitted. Man-in-the-Middle attacks are a common type of cybersecurity attack that allows attackers to eavesdrop on communications between two targets. This article discusses how people can protect themselves, what they need to know, and how an attacker performs a MITM attack using the open-source tools bettercap and net-creds in kali Linux. Buttercup is a network attack and monitoring program that can perform ARP spoofing and sniffing. Netcreds is a sniffing tool available by cloning on Github. This article attempts to implement this attack for instructional use.