FIELD: information technology.
SUBSTANCE: after allocating addresses of the sender SA and recipient SB, a transmission route mj of a network datagram Pi over an external network between secure computer networks is formed in form of a series of trusted nodes S1, S2, Svj, which is recorded in the "Option" field of the network datagram. A network datagram with the address of the recipient Sb and the address of the nearest trusted node SVj is formed in accordance with the transmission route mj of the network datagram Ps. The network datagram is encrypted using a cryptographic key K and the operations are repeated, starting with formation of a network datagram and its encryption to formation of a network datagram with the address of the recipient S1 and the address of the sender Sa. The formed secure network datagram D, which is received at a trusted node at the address of the recipient S1, is transmitted over the communication channel of the external network. The network datagram is decrypted using the cryptographic key K and values of the "Option" field are recorded into the memory of a gateway computer. A new value of the "Option" field is generated based on the address of the passed trusted node, which is recorded into the "Option" field. Values given in the "Option" field are compared with values of the transmission route of the secure network datagram defined at the recipient node and if the transmission route does not match, the network datagram is blocked.
EFFECT: more reliable detection of forgery of computer addresses of the sender and recipient of network datagrams.
3 cl, 7 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF PROCESSING NETWORK TRAFFIC DATAGRAMS FOR HIDING CORRESPONDING PAIRS OF SUBSCRIBERS OF INFORMATION-TELECOMMUNICATION SYSTEMS | 2014 |
|
RU2586840C1 |
METHOD FOR PROCESSING NETWORK TRAFFIC DATAGRAMS TO HIDE CORRESPONDING PAIRS OF SUBSCRIBERS OF INFORMATION AND TELECOMMUNICATION SYSTEMS | 2020 |
|
RU2763261C1 |
METHOD OF ROUTING TRAFFIC, HAVING PRIORITY CLASS IN COMMUNICATION NETWORK, INCLUDING TWO AND MORE OPERATORS | 2016 |
|
RU2631144C1 |
METHOD FOR PROCESSING NETWORK TRAFFIC DATAGRAMS FOR DELIMITING ACCESS TO INFORMATIONAL AND COMPUTING RESOURCES OF COMPUTER NETWORKS | 2006 |
|
RU2314562C1 |
METHOD TO PROTECT INFORMATION COMPUTER NETWORKS AGAINST COMPUTER ATTACKS | 2012 |
|
RU2483348C1 |
METHOD OF PROTECTING INFORMATION COMPUTER NETWORKS FROM COMPUTER ATTACKS | 2011 |
|
RU2472211C1 |
METHOD OF DETECTION OF COMPUTER ATTACKS IN INFORMATION AND TELECOMMUNICATION NETWORK | 2013 |
|
RU2531878C1 |
METHOD OF PROTECTING COMPUTER NETWORKS FROM UNAUTHORISED SCANNING AND BLOCKING OF NETWORK SERVICES (VERSIONS) | 2011 |
|
RU2469390C1 |
METHOD OF PROTECTING COMPUTER NETWORK | 2010 |
|
RU2422892C1 |
METHOD FOR PROTECTING INFORMATION-COMPUTER NETWORKS AGAINST CYBER ATTACKS | 2016 |
|
RU2622788C1 |
Authors
Dates
2013-01-10—Published
2012-02-03—Filed