BETARTIB KOMPYUTER TARMOQLARI BARQARORLIGINI EVRISTIK JARIMALARGA KO'RA BAHOLOVCHI “HEALTH SCORE” MATEMATIK MODELI
Keywords:
Health Score, Evristik baholash modeli, Topologiya, Shadow IT, Loopback, Graflar nazariyasi (Graph Theory), Tarmoq anomaliyalari, MAC/OUI tahlili, Aqlli monitoringAbstract
Yirik va murakkab korporativ tarmoq infratuzilmalarida (Enterprise Networks) "Yashirin tarmoq" (Shadow IT), mantiqiy tarmoq halqalari (Loopback), portlarning beqaror o‘chib-yonishi (Flapping) va ruxsatsiz simsiz qurilmalarning ulanishi butun tizim barqarorligiga jiddiy tahdid soladi. An’anaviy tarmoq monitoringi tizimlari (PRTG, Zabbix, SolarWinds) asosan statik ko‘rsatkichlarga, ya’ni trafik hajmiga (Bandwidth), protsessor yuklamasiga (CPU Usage) va moslamaning uzilish vaqtiga (Latency/Timeout) qaratilgan bo‘lib, tarmoq ichida yashirin rivojlanayotgan mikro-topologik anomaliyalarni
vaqtida aniqlay olmaydi. Ushbu maqolada betartib va ko‘p-vendorli lokal tarmoqlarning umumiy sog‘lig‘i hamda barqarorligini baholash uchun yangi - Evristik jarimalarga asoslangan "Health Score" (H(S)) matematik modeli taklif etiladi. Ushbu dinamik matematik va mantiqiy model, qurilmalar markazidan olingan MAC/OUI xesh-jadvallari, STP inqirozlari va FDB ma’lumotlarini Graflar nazariyasi (Graph Theory) yordamida tahlil qilish orqali anomaliyalarni jarima balli (Penalty) sifatida hisoblaydi. Natijada shakllangan H(S) ko‘rsatkichi tizim operatorlari va avtomatik qaror qabul qilish dvigatellari (Active Decision Engine) uchun dasturilamal xizmat qiladi.
References
1. Diestel, R. (2017). Graph Theory (5th ed.). Springer-Verlag.
2. Silberschatz, A., Galvin, P. B., & Gagne, G. (2018). Operating System Concepts (10th ed.). Wiley.
3. Sequeira, A. (2019). CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide. Cisco Press.
4. Clemm, A. (2006). Network Management Fundamentals. Cisco Press. (Tarmoq monitoringi va holatini baholash modellari).
5. Halabi, S. (2000). Internet Routing Architectures. Cisco Press.
6. O'zbekiston Respublikasida axborot xavfsizligi va korporativ tarmoqlar muhofazasiga oid davlat standartlari (O'z DSt).
7. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.
8. Sivaraman, V., Gharakheili, H. H., Vishwanath, A., Boreli, R., & Mehani, O. (2015). Network-Level Security and Privacy Control for Smart-Home IoT Devices. IEEE 11th International Conference on Wireless and Mobile Computing (WiMob), 163–167.
9. Mauro, D. R., & Schmidt, K. J. (2005). Essential SNMP (2nd ed.). O'Reilly Media.
10. Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network Anomaly Detection: Methods, Systems and Tools. IEEE Communications Surveys & Tutorials, 16(1), 303–336.
11. Lakhina, A., Crovella, M., & Diot, C. (2004). Diagnosing Network-Wide Traffic Anomalies. ACM SIGCOMM Computer Communication Review, 34(4), 219–230.
12. Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.). Pearson.
13. IEEE 802.1D-2004. IEEE Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges. IEEE Standards Association. (STP Spanning Tree Protocol standarti).
14. Boutaba, R., Salahuddin, M. A., Limam, N., Ayoubi, S., Shahriar, N., Estrada-Solano, F., & Caicedo, O. M. (2018). A Comprehensive Survey on Machine Learning for Networking: Evolution, Applications and Research Opportunities. Journal of Internet Services and Applications, 9(1), 1–99.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Nishanov Axram Xasanovich, Qalandarov Jamil Jalolovich, Omonov Zokirjon Hojiboy o’g‘li, Akmalov Elyor Ilhomovich

This work is licensed under a Creative Commons Attribution 4.0 International License.







