<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2025-10-2-0-5</article-id><article-id pub-id-type="publisher-id">3821</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;USAGE OF HASH TABLES IN THE MECHANISM&amp;nbsp;OF PROTECTION AGAINST DOS ATTACKS USING&amp;nbsp;THE PYTHON LANGUAGE&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;USAGE OF HASH TABLES IN THE MECHANISM&amp;nbsp;OF PROTECTION AGAINST DOS ATTACKS USING&amp;nbsp;THE PYTHON LANGUAGE&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Golovinsky</surname><given-names>Semyon Antonovich</given-names></name><name xml:lang="en"><surname>Golovinsky</surname><given-names>Semyon Antonovich</given-names></name></name-alternatives><email>tositrent164@gmail.com</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>mashechka-81@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Lagutkina</surname><given-names>Tatiana Vladimirovna</given-names></name><name xml:lang="en"><surname>Lagutkina</surname><given-names>Tatiana Vladimirovna</given-names></name></name-alternatives><email>lagutkina.tatiana@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2025</year></pub-date><volume>10</volume><issue>2</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2025/2/НР.ИТ_10.2_5.pdf" /><abstract xml:lang="ru"><p>This article addresses the current problem of hash table security in the context of DoS attacks caused by deliberate collisions. Hash collisions can be exploited by attackers to significantly slow down system performance, as this increases the time for searching and inserting data in hash tables. The main focus is on protective mechanisms implemented in Python, where randomized salts are used in hash functions to prevent such attacks. The paper provides a detailed analysis of how hash tables work, the nature of collision occurrences, and the features of implementing randomized hashing. Key concepts are explained, and practical examples in Python are provided. Various collision attack methods and their prevention strategies are explored. The concluding part of the article contains specific recommendations for the secure use of hash tables and enhancing the overall security of information systems. Both the technical aspects of implementing protective mechanisms and the organizational measures for protection against DoS attacks are considered. The article will be useful for software developers, information security specialists, and researchers in the field of computer science.</p></abstract><trans-abstract xml:lang="en"><p>This article addresses the current problem of hash table security in the context of DoS attacks caused by deliberate collisions. Hash collisions can be exploited by attackers to significantly slow down system performance, as this increases the time for searching and inserting data in hash tables. The main focus is on protective mechanisms implemented in Python, where randomized salts are used in hash functions to prevent such attacks. The paper provides a detailed analysis of how hash tables work, the nature of collision occurrences, and the features of implementing randomized hashing. Key concepts are explained, and practical examples in Python are provided. Various collision attack methods and their prevention strategies are explored. The concluding part of the article contains specific recommendations for the secure use of hash tables and enhancing the overall security of information systems. Both the technical aspects of implementing protective mechanisms and the organizational measures for protection against DoS attacks are considered. The article will be useful for software developers, information security specialists, and researchers in the field of computer science.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>information security</kwd><kwd>security</kwd><kwd>hash table</kwd><kwd>Ddos attack</kwd><kwd>collision</kwd><kwd>hash randomization</kwd><kwd>Python</kwd><kwd>DoS protection</kwd><kwd>hash function</kwd></kwd-group><kwd-group xml:lang="en"><kwd>information security</kwd><kwd>security</kwd><kwd>hash table</kwd><kwd>Ddos attack</kwd><kwd>collision</kwd><kwd>hash randomization</kwd><kwd>Python</kwd><kwd>DoS protection</kwd><kwd>hash function</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Kuzminykh, E.S. Analysis of impenetrable encryption algorithms / E.S. Kuzminykh, S.P. Ilina, M.A.&amp;nbsp;Maslova // Research result. Information technologies. &amp;ndash; Т. 9, №1, 2024. &amp;ndash; P. 10-18. DOI: 10.18413/2518-1092-2024-9-1-0-2</mixed-citation></ref><ref id="B2"><mixed-citation>Dos-Attack [Electronic resource]. URL: https://stormwall.pro/rsources/terms/attacks/dos</mixed-citation></ref><ref id="B3"><mixed-citation>Nadejkina, V. S. Analysis of open-source intrusion detection and prevention systems for integration with russian operating systems / V. S. Nadejkina, M. A. Maslova // Research result. Information technologies. &amp;ndash; Т.9, №2, 2024. &amp;ndash; P. 41-48. DOI: 10.18413/2518-1092-2024-9-2-0-5</mixed-citation></ref><ref id="B4"><mixed-citation>Hash maps [Electronic resource]. URL: https://codechick.io/tutorials/dsa/dsa-hash-table</mixed-citation></ref><ref id="B5"><mixed-citation>Description of the complexity of the algorithms [Electronic resource]. URL: https://habr.com/ru/articles/444594</mixed-citation></ref><ref id="B6"><mixed-citation>Non-cryptographic hash functions and DoS attack on them [Electronic resource]. URL: https://protect.htmlweb.ru/des.htm</mixed-citation></ref><ref id="B7"><mixed-citation>Collision attack [Electronic resource]. URL: https://habr.com/ru/articles/178955</mixed-citation></ref><ref id="B8"><mixed-citation>Memory model in programming languages [Electronic resource]. URL: https://tproger.ru/articles/memory-model</mixed-citation></ref><ref id="B9"><mixed-citation>Memory operation in Python [Electronic resource]. URL: https://habr.com/ru/articles/721804/</mixed-citation></ref><ref id="B10"><mixed-citation>Stack overflow [Electronic resource]. URL: https://ru.wikipedia.org/wiki/%D0%9F%D0%B5%D1%80%D0%B5%D0%BF%D0%BE%D0%BB%D0%BD%D0%B5%D0%BD%D0%B8%D0%B5_%D1%81%D1%82%D0%B5%D0%BA%D0%B0</mixed-citation></ref><ref id="B11"><mixed-citation>What&amp;rsquo;s the difference between stack and heap Electronic resource]. URL: https://wiki.merionet.ru/articles/stek-i-kuca-v-cem-raznica</mixed-citation></ref><ref id="B12"><mixed-citation>Password salts (Advanced Encryption Standard) works [Electronic resource]. URL: https://habr.com/ru/articles/145648/</mixed-citation></ref><ref id="B13"><mixed-citation>Python programming language. Part 2. Compilers and Interpreters [Electronic resource]. URL: https://verity.by/news/yazyk-programmirovaniya-python-chast-2-kompilyatory-i-interpretatory/</mixed-citation></ref><ref id="B14"><mixed-citation>Determinants of the development of the Russian economy in the conditions of digital transformation and ensuring technological sovereignty / E.N. Makarenko, I.A. Polyakova, I.A. Kislaya [and others]. &amp;ndash; Rostov-on-Don: Rostov State Economic University &amp;ldquo;RINH&amp;rdquo;, 2023. &amp;ndash; 546 p. &amp;ndash; ISBN 978-5-7972-3086-1. &amp;ndash; EDN SHIVS.</mixed-citation></ref><ref id="B15"><mixed-citation>Maslova, M.A. Problems of cloud services and methods of protection against risks and threats / M.A.&amp;nbsp;Maslova, E.S. Kuz&amp;#39;minyh // Research result. Information technologies. &amp;ndash; Т.7, №3, 2022. &amp;ndash; P. 14-22. DOI: 10.18413/2518-1092-2022-7-3-0-2</mixed-citation></ref></ref-list></back></article>