FIELD: information technology.
SUBSTANCE: in the method, initial data containing addresses of the message sender and the recipient are given. A base of Z false sender addresses is formed at the recipient and the sender in given initial data. The current address of the sender and the recipient is stored. The current false address of the sender is selected from the given base of false addresses and stored. At the sender, a packet header identifier is formed based on a random law and information on the return address of the sender is also formed. An initial data packet is formed. The formed message packet is sent from the sender to the recipient. The data packet is received from the sender. Encoded data are selected by the recipient and decoded. Information on new current addresses of the sender and recipient is formed at the recipient. A notifying message packet is then formed and sent from the recipient to the sender. The notifying packet is received from the recipient. The current addresses of the sender and recipient are extracted therefrom and compared with the stored false return address of the sender and the address of the sender. If the addresses do not match, the received data packet is not analysed, and in case of a match, encoded data are extracted from the received notifying message packet and decoded.
EFFECT: high level of security and secure operation of segments of a computer network over communication channels.
4 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF COMPUTER NETWORK PROTECTION (VARIANTS) | 2006 |
|
RU2325694C1 |
METHOD (VARIANTS) AND DEVICE (VARIANTS) FOR PROTECTING COMMUNICATION CHANNEL OF A COMPUTER NETWORK | 2006 |
|
RU2306599C1 |
METHOD FOR PROTECTION OF COMPUTER NETWORKS BASED ON LEGENDIZING | 2023 |
|
RU2814463C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2696549C1 |
METHOD OF PROTECTING COMPUTER NETWORKS BASED ON ADAPTIVE INTERACTION | 2019 |
|
RU2715165C1 |
METHOD FOR PROTECTING COMPUTING NETWORKS FROM COMPUTER ATTACKS DIRECTED ON VARIOUS NODES AND INFORMATION RESOURCES | 2021 |
|
RU2782704C1 |
METHOD (VARIANTS) FOR PROTECTING COMPUTER NETWORKS | 2006 |
|
RU2307392C1 |
METHOD FOR PROTECTION OF COMPUTER NETWORKS | 2012 |
|
RU2475836C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2017 |
|
RU2649789C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2674802C1 |
Authors
Dates
2013-08-20—Published
2012-06-04—Filed