FIELD: information technology.
SUBSTANCE: method involves the following sequence of operations. A gateway computer with a firewall is connected in communication channels of a protected computer network. A data base of parameters of legitimate packets is created and data packets coming from an open network are blocked during the period for establishing legitimacy. The address of the recipient is recorded. Packets from the open network are analysed, for which their parameters are compared with a data base of parameters of legitimate packets created beforehand. After analysis, an ICMP receipt is created, in which the address of the sender is replaced with the stored address of the recipient. The receipt is then sent to an illegitimate sender.
EFFECT: low probability of an intruder detecting use of local-area network security by misleading the intruder.
4 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2680038C1 |
METHOD OF PROCESSING NETWORK TRAFFIC DATAGRAMS FOR HIDING CORRESPONDING PAIRS OF SUBSCRIBERS OF INFORMATION-TELECOMMUNICATION SYSTEMS | 2014 |
|
RU2586840C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2690749C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2696330C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2686023C1 |
COMPUTER NETWORK WITH INTERNET SCREEN AND INTERNET SCREEN | 2000 |
|
RU2214623C2 |
METHOD OF PROCESSING NETWORK TRAFFIC DATAGRAMS FOR PROTECTING INFORMATION COMPUTER SYSTEMS (VERSIONS) | 2012 |
|
RU2472217C1 |
METHOD FOR PROCESSING NETWORK TRAFFIC DATAGRAMS FOR DELIMITING ACCESS TO INFORMATIONAL AND COMPUTING RESOURCES OF COMPUTER NETWORKS | 2006 |
|
RU2314562C1 |
METHOD OF PROTECTING COMPUTING NETWORK FROM UNAUTHORIZED SCANNING AND BLOCKING NETWORK SERVICES | 2017 |
|
RU2648949C1 |
METHOD FOR PROTECTING INFORMATION AND TELECOMMUNICATION NETWORK FROM PASSIVE COMPUTER ATTACKS | 2016 |
|
RU2642403C1 |
Authors
Dates
2011-06-27—Published
2010-04-13—Filed