FIELD: radio engineering, communication.
SUBSTANCE: multiple reference sets of appearances of unauthorised information flows are set, which differ from each other by identifiers SREF ={Sj}, and also the threshold value of hit ratio QHIT THRESHOLD is set for a sequence of appearances of an unauthorised information flow with an appropriate reference set, after identification of identifiers from a heading of another received packet of messages and their comparison with reference identifiers, in case of mismatch of a receiver's address in the received packet of messages of an unauthorised information flow with specified false addresses of subscribers of a computer network it is additionally added into a list of preset false addresses of subscribers of a computer network, then the message packet is sent to specified false addresses of computer network subscribers, identifiers of appearance of Ki of the received unauthorised flow are compared with values available in reference sets Sj of appearances of unauthorised information flows, in case of mismatch a new Sj+1 reference set is generated and memorised, afterwards they compare values of the produced hit ratio QHIT with the threshold value QHIT THRESHOLD, and if the condition QHIT≥QHIT THRESHOLD is met, they block the unauthorised information flow, and an attack signal is generated to the computer network.
EFFECT: higher security, also validity and efficiency of detecting unauthorised impact at a computer network.
4 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2696549C1 |
METHOD OF PROTECTING COMPUTER NETWORKS WITH IDENTIFICATION OF MULTIPLE SIMULTANEOUS ATTACKS | 2019 |
|
RU2739206C1 |
METHOD OF PROTECTING COMPUTER NETWORKS BASED ON ADAPTIVE INTERACTION | 2019 |
|
RU2715165C1 |
METHOD FOR PROTECTING COMPUTING NETWORKS FROM COMPUTER ATTACKS DIRECTED ON VARIOUS NODES AND INFORMATION RESOURCES | 2021 |
|
RU2782704C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2674802C1 |
METHOD FOR PROTECTION OF COMPUTER NETWORKS BASED ON LEGENDIZING | 2023 |
|
RU2814463C1 |
METHOD (VARIANTS) FOR PROTECTING COMPUTER NETWORKS | 2006 |
|
RU2307392C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2017 |
|
RU2649789C1 |
METHOD FOR CONTROLLING INFORMATION STREAMS IN DIGITAL COMMUNICATION NETWORKS | 2004 |
|
RU2267154C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2680038C1 |
Authors
Dates
2013-02-20—Published
2012-03-12—Filed