<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2022-7-1-0-3</article-id><article-id pub-id-type="publisher-id">2697</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;REVIEW OF SOME DATA TRANSFER PROTOCOLS FROM THE POSITION OF INFORMATION SECURITY&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;REVIEW OF SOME DATA TRANSFER PROTOCOLS FROM THE POSITION OF INFORMATION SECURITY&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Zhikharev</surname><given-names>Alexander Gennadievich</given-names></name><name xml:lang="en"><surname>Zhikharev</surname><given-names>Alexander Gennadievich</given-names></name></name-alternatives><email>zhikharev@bsu.edu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Fefelov</surname><given-names>Oleg Sergeevich</given-names></name><name xml:lang="en"><surname>Fefelov</surname><given-names>Oleg Sergeevich</given-names></name></name-alternatives></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Mamatov</surname><given-names>Mikhail Evgenievich</given-names></name><name xml:lang="en"><surname>Mamatov</surname><given-names>Mikhail Evgenievich</given-names></name></name-alternatives></contrib></contrib-group><pub-date pub-type="epub"><year>2022</year></pub-date><volume>7</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2022/1/Информационные_технологии_7_1-3.pdf" /><abstract xml:lang="ru"><p>The article identifies and describes the main problems in the field of recreational fishing: the The article discusses some data transfer protocols in computer networks from the standpoint of information security. In particular, data transfer protocols used to organize virtual private networks are considered. This is due to the fact that modern realities encourage users to actively use such technologies both to implement authorized functionality and to circumvent the regulations for providing access to prohibited electronic resources. In addition, the paper shows that the use of various information transfer protocols creates certain problems in the development of automated solutions, in particular, in the interpretation of network traffic.</p></abstract><trans-abstract xml:lang="en"><p>The article identifies and describes the main problems in the field of recreational fishing: the The article discusses some data transfer protocols in computer networks from the standpoint of information security. In particular, data transfer protocols used to organize virtual private networks are considered. This is due to the fact that modern realities encourage users to actively use such technologies both to implement authorized functionality and to circumvent the regulations for providing access to prohibited electronic resources. In addition, the paper shows that the use of various information transfer protocols creates certain problems in the development of automated solutions, in particular, in the interpretation of network traffic.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>data transfer protocol</kwd><kwd>information security</kwd><kwd>network traffic</kwd><kwd>intelligent network technologies</kwd></kwd-group><kwd-group xml:lang="en"><kwd>data transfer protocol</kwd><kwd>information security</kwd><kwd>network traffic</kwd><kwd>intelligent network technologies</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Petrenko S. Protected virtual private network: a modern view on the protection of confidential data // World of the Internet. M. 2001. No. 2.</mixed-citation></ref><ref id="B2"><mixed-citation>Faylner M. Virtual private networks of the new generation LAN // Journal of Network Solutions.</mixed-citation></ref><ref id="B3"><mixed-citation>M. 2005. No. 11.</mixed-citation></ref><ref id="B4"><mixed-citation>Fratto M. Secrets of virtual private networks. Networks and communication systems // Emergent Actors in World Politics: How States and Nations Develop and Dissolv. Princeton University Press. 1997. No. 3.</mixed-citation></ref><ref id="B5"><mixed-citation>Ivanov M. A. Cryptographic methods of protecting information in computer systems and networks.</mixed-citation></ref><ref id="B6"><mixed-citation>M. KUDITs-Obraz. 2001.</mixed-citation></ref><ref id="B7"><mixed-citation>Kolesnikov O. Linux: the creation of virtual private networks (VPN): per. from English. / O. Kolesnikov, B. Hatch. M. KUDITs-Obraz. 2004. 459 p.</mixed-citation></ref><ref id="B8"><mixed-citation>M. W. Youssef, Hazem El-Gendy. Securing Authentication of TCP/IP Layer Two By Modifying Challenge-Handshake Authentication Protocol // Advanced Computing: An International Journal. 2012. P. 11.</mixed-citation></ref><ref id="B9"><mixed-citation>Rand Morimoto, Kenton Gardinier, Michael Noel and Joe Coca. Microsoft Exchange Server 2003 Unleashed. 2003. P. 244.</mixed-citation></ref><ref id="B10"><mixed-citation>Kaufman. C., Perlman. R., and Speciner. M., Network Security: Private Communications in a Public World // Prentice Hall. 1995.</mixed-citation></ref></ref-list></back></article>