FIELD: information technology.
SUBSTANCE: method involves forming an array for storing fragmented message packets and arrays for storing parameters from the stored message packets; upon detection of a computer attack, stored values of message packets are deleted; the allocated fields used are defined data fields and a list of trusted addresses of a recipient and sender of message packets which are stored in arrays of reference parameters of values of corresponding data fields is created.
EFFECT: faster detection of computer attacks.
6 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR PROTECTING INFORMATION-COMPUTER NETWORKS AGAINST CYBER ATTACKS | 2016 |
|
RU2622788C1 |
METHOD OF DETECTION OF COMPUTER ATTACKS IN INFORMATION AND TELECOMMUNICATION NETWORK | 2013 |
|
RU2531878C1 |
METHOD TO PROTECT INFORMATION COMPUTER NETWORKS AGAINST COMPUTER ATTACKS | 2012 |
|
RU2483348C1 |
METHOD FOR PROTECTING INFORMATION-COMPUTER NETWORK AGAINST UNAUTHORIZED IMPACT | 2016 |
|
RU2635256C1 |
METHOD FOR PROTECTING INFORMATION AND TELECOMMUNICATION NETWORK FROM PASSIVE COMPUTER ATTACKS | 2016 |
|
RU2642403C1 |
METHOD OF DETECTING COMPUTER ATTACKS TO NETWORKED COMPUTER SYSTEM | 2013 |
|
RU2538292C1 |
METHOD OF DETECTING NETWORK ATTACKS BASED ON ANALYSIS OF TRAFFIC TIME STRUCTURE | 2017 |
|
RU2680756C1 |
METHOD OF PROCESSING NETWORK TRAFFIC DATAGRAMS FOR PROTECTING INFORMATION COMPUTER SYSTEMS (VERSIONS) | 2012 |
|
RU2472217C1 |
METHOD OF PROTECTING AN INFORMATION NETWORK FROM INTRUSIONS | 2019 |
|
RU2705773C1 |
METHOD FOR PROTECTING COMPUTER NETWORKS FROM COMPUTER ATTACKS | 2005 |
|
RU2285287C1 |
Authors
Dates
2013-01-10—Published
2011-11-23—Filed