FIELD: information technology.
SUBSTANCE: network nodes are assigned security parameters and their values. A set of possible link paths between the i-th and j-th network nodes is created. The average safety indicators for the paths are calculated and the most secure are selected for messaging. Using an entropy function, the fractions of streams for each path, which provide uniformity of relative safety indicators of paths and uniform significance of paths in the sense of information security are calculated.
EFFECT: high resistance of the network to information security threats.
9 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF EVASIVE ROUTING IN COMMUNICATION NETWORKS (VARIANTS) | 2007 |
|
RU2331158C1 |
METHOD FOR MASKING THE STRUCTURE OF TELECOMMUNICATION NETWORK | 2016 |
|
RU2622842C1 |
METHOD FOR COMMUNICATION NETWORK STRUCTURE MASKING | 2023 |
|
RU2794532C1 |
METHOD FOR MASKING STRUCTURE OF TELECOMMUNICATION NETWORK | 2016 |
|
RU2645292C2 |
COMMUNICATION NETWORK STRUCTURE MASKING METHOD | 2018 |
|
RU2682105C1 |
METHOD FOR MASKING STRUCTURE OF COMMUNICATION NETWORK | 2020 |
|
RU2739151C1 |
METHOD FOR MASKING STRUCTURE OF COMMUNICATION NETWORK | 2021 |
|
RU2759152C1 |
METHOD FOR COMMUNICATION NETWORK STRUCTURE MASKING | 2022 |
|
RU2793104C1 |
METHOD OF SELECTING SAFE ROUTE IN COMMUNICATION NETWORK OF GENERAL USE | 2016 |
|
RU2640627C1 |
METHOD OF SIMULATING VIRTUAL NETWORKS IN CONDITIONS OF DESTRUCTIVE SOFTWARE ACTIONS | 2018 |
|
RU2701994C1 |
Authors
Dates
2011-02-20—Published
2009-07-21—Filed