FIELD: electric communications, possible use in systems for detecting attacks with a goal of operative detection and prevention of unsanctioned actions in computing networks.
SUBSTANCE: in claimed method (variants), operative detection of unsanctioned actions and reduction of speed of transfer of generated response message packets are achieved in accordance to interaction rules. In first variant, of method, transmission of response message packets to perpetrator occurs during his access of real and fake addresses of computer network clients. In second variant of method, transmission of certain message packets is blocked resulting in imitation of bad quality of communication channel. In accordance to third variant of method, identifier of unsanctioned information streams are recorded resulting in possible detection of unsanctioned actions at initial stage.
EFFECT: increased degree of protection of computer networks from unsanctioned actions, and also bluffing with perpetrator concerning structure of computing networks.
3 cl, 8 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR PROTECTION OF COMPUTER NETWORKS | 2012 |
|
RU2475836C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2696549C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2674802C1 |
METHOD OF PROTECTING COMPUTER NETWORKS BASED ON ADAPTIVE INTERACTION | 2019 |
|
RU2715165C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2017 |
|
RU2649789C1 |
METHOD FOR PROTECTION OF COMPUTER NETWORKS BASED ON LEGENDIZING | 2023 |
|
RU2814463C1 |
METHOD OF PROTECTING COMPUTER NETWORKS WITH IDENTIFICATION OF MULTIPLE SIMULTANEOUS ATTACKS | 2019 |
|
RU2739206C1 |
METHOD FOR PROTECTING COMPUTING NETWORKS FROM COMPUTER ATTACKS DIRECTED ON VARIOUS NODES AND INFORMATION RESOURCES | 2021 |
|
RU2782704C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2680038C1 |
METHOD FOR CONTROLLING INFORMATION STREAMS IN DIGITAL COMMUNICATION NETWORKS | 2004 |
|
RU2267154C1 |
Authors
Dates
2007-09-27—Published
2006-05-02—Filed