Overview of network traffic classification methods
Автор: Ponomareva Olga Alexeevna, Chistyakov Maxim Vladimirovich, Gribov Mikhail Andreevich, Barybin Dmitry Alexandrovich
Статья в выпуске: 4 (69) т.21, 2025 года.
Бесплатный доступ
The article studies the influence of traffic components on information security. The purpose of the study is to identify the dependence of traffic components on the actions of the automated workplace operator. The research methodology is analytical. The main results include a scientifically substantiated proposal to divide traffic into three types according to the security criterion and justification for the relationship of the traffic type to the actions of the automated workplace operator. The article focuses on specifying the terms and definitions affecting the concept of “traffic”. The processes occurring in the hierarchy of the reference model of open systems interaction (RM OSI) are briefly mentioned.
Traffic, internet, client, server, infocommunication environment, protection, traffic generator
Короткий адрес: https://sciup.org/14134344
IDR: 14134344 | УДК: 658.5.012.7