FIELD: technological processes.
SUBSTANCE: invention is related to the sphere of computer network protection, in particular, to the method of providing safety of distributed computing network. Method consists in performance of the following actions: initial data is preset, sender forms initial data burst, and in case the sender does not have data for formation of valid initial data burst, a false initial data burst is formed, the received data burst is coded and transformed in format TCP/IP, sender and recipient addresses are included into it, and formed data burst is sent to the recipient. Sender's address is changed. Addresses of sender and recipient are extracted from the recipient and compared with preset addresses. In case of mismatch received data bursts are not analyzed, and in case of match coded data is extracted from the received data burst and is decoded. Recipient's address is changed. Then repeatedly initial data burst is formed at the sender. Stated variants differ in sequences of actions, which realize changes of addresses of corresponding subjects of distributed computing network and actions by masking intensity of data traffic between them.
EFFECT: increases safety of computing networks.
22 cl, 24 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD (VARIANTS) AND DEVICE (VARIANTS) FOR PROTECTING COMMUNICATION CHANNEL OF A COMPUTER NETWORK | 2006 |
|
RU2306599C1 |
METHOD FOR MASKING THE STRUCTURE OF THE COMMUNICATION NETWORK | 2017 |
|
RU2656839C1 |
METHOD FOR MASKING THE STRUCTURE OF COMMUNICATION NETWORK | 2017 |
|
RU2668979C2 |
METHOD OF PROTECTING COMPUTER NETWORK HAVING DEDICATED SERVER | 2009 |
|
RU2449361C2 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2017 |
|
RU2649789C1 |
METHOD OF PROTECTING COMMUNICATION CHANNEL OF COMPUTER NETWORK | 2012 |
|
RU2490703C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2019 |
|
RU2726900C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2674802C1 |
METHOD OF PROTECTING COMPUTER NETWORKS BASED ON ADAPTIVE INTERACTION | 2019 |
|
RU2715165C1 |
METHOD FOR PROTECTION OF COMPUTER NETWORKS BASED ON LEGENDIZING | 2023 |
|
RU2814463C1 |
Authors
Dates
2008-05-27—Published
2006-11-02—Filed