FIELD: electricity.
SUBSTANCE: method includes stages, at which the following is carried out: a list of trusted addresses of a receiver and a sender of message packets is formed, a verification packet is formed, for this purpose the sender's address D is read, and the receiver's address lj, and the initial value equal to one is recorded into the field "Packet life time" TTL, afterwards the formed packet Pij is formed into a massif P, the value of quantity Kadd is set for the received response packets on the non-delivered packet Pij with the current value of the field "Packet life time" TTL, then the formed packet is sent to a communication channel.
EFFECT: improved validity of detection of computer attacks at ICNs.
4 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR PROTECTING INFORMATION AND TELECOMMUNICATION NETWORK FROM PASSIVE COMPUTER ATTACKS | 2016 |
|
RU2642403C1 |
METHOD OF DETECTION OF COMPUTER ATTACKS IN INFORMATION AND TELECOMMUNICATION NETWORK | 2013 |
|
RU2531878C1 |
METHOD OF PROTECTING INFORMATION COMPUTER NETWORKS FROM COMPUTER ATTACKS | 2011 |
|
RU2472211C1 |
METHOD FOR PROTECTING INFORMATION-COMPUTER NETWORKS AGAINST CYBER ATTACKS | 2016 |
|
RU2622788C1 |
METHOD FOR PROTECTING INFORMATION-COMPUTER NETWORK AGAINST UNAUTHORIZED IMPACT | 2016 |
|
RU2635256C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2680038C1 |
METHOD OF DETECTING COMPUTER ATTACKS TO NETWORKED COMPUTER SYSTEM | 2013 |
|
RU2538292C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2690749C1 |
METHOD OF PROTECTING AN INFORMATION NETWORK FROM INTRUSIONS | 2019 |
|
RU2705773C1 |
METHOD OF PROCESSING NETWORK TRAFFIC DATAGRAMS FOR PROTECTING INFORMATION COMPUTER SYSTEMS (VERSIONS) | 2012 |
|
RU2472217C1 |
Authors
Dates
2013-05-27—Published
2012-04-26—Filed