Ponomareva Olga Alexeevna, Associate Professor, Candidate of Sciences (Engineering), Educational and Research Center “Information Security”, Ural Federal University named after the first President of Russia B.N. Yeltsin
Chistyakov Maxim Vladimirovich, Master’s Student, Educational and Research Center “Information Security”, Ural Federal University named after the first President of Russia B.N. Yeltsin
Gribov Mikhail Andreevich, Master’s Student, Educational and Research Center “Information Security”, Ural Federal University named after the first President of Russia B.N. Yeltsin
Barybin Dmitry Alexandrovich, Master’s Student, Educational and Research Center “Information Security”, Ural Federal University named after the first President of Russia B.N. Yeltsin
Abstract
The article studies the influence of traffic components on information security. The purpose of the study is to identify the dependence of traffic components on the actions of the automated workplace operator. The research methodology is analytical. The main results include a scientifically substantiated proposal to divide traffic into three types according to the security criterion and justification for the relationship of the traffic type to the actions of the automated workplace operator. The article focuses on specifying the terms and definitions affecting the concept of “traffic”. The processes occurring in the hierarchy of the reference model of open systems interaction (RM OSI) are briefly mentioned.
KEYWORDS: traffic, internet, client, server, infocommunication environment, protection, traffic generator.
Download article OVERVIEW OF NETWORK TRAFFIC CLASSIFICATION METHODS![]()



