FIELD: physics, computer engineering.
SUBSTANCE: group of inventions relates to means of controlling data streams in secure distributed information systems. The method includes specifying a table of reference routing files of a distributed information system in test operating mode thereof, consisting of reference routing files for all authorised users when said users access information resources and services of certain network nodes of the distributed information system. After permission to transmit a data stream in a switching unit at a certain network node, routing files are generated thereon when the i-th user accesses information resources and services of the j-th network node of the distributed information system; the obtained routing files are transmitted to an access control centre. The obtained routing files are compared with reference values; the j-th network node of the distributed information system is remembered when accessed by the i-th user if the routing files do not match. The switching table is then corrected and, using the new network interaction parameters, said data stream is blocked, and transmission continues in case of a match.
EFFECT: improved security of distributed information systems.
2 cl, 4 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD AND APPARATUS FOR CONTROLLING DATA STREAMS OF A DISTRIBUTED INFORMATION SYSTEM USING IDENTIFIERS | 2019 |
|
RU2710284C1 |
METHOD AND APPARATUS FOR CONTROLLING DISTRIBUTED INFORMATION SYSTEM DATA STREAMS | 2012 |
|
RU2509425C1 |
METHOD AND FACILITY FOR CONTROL OF DATA STREAMS OF PROTECTED DISTRIBUTED INFORMATION SYSTEMS IN NETWORK OF CODED COMMUNICATION | 2008 |
|
RU2402881C2 |
METHOD FOR CONTROL OF DISTRIBUTED INFORMATION SYSTEM DATA STREAMS IN DDoS ATTACKS | 2018 |
|
RU2684575C1 |
METHOD OF CONTROLLING DATA STREAMS IN DISTRIBUTED INFORMATION SYSTEMS | 2014 |
|
RU2568784C1 |
METHOD OF CONTROLLING DATA STREAMS BASED ON MONITORING GIVEN CONSUMER ROUTE AND DETECTION OF EVENT OF DESTRUCTIVE EFFECT | 2014 |
|
RU2586858C1 |
FACILITY TO CONTROL SESSIONS OF SECURE VIDEO CONFERENCING IN CODED COMMUNICATION NETWORK | 2008 |
|
RU2460235C2 |
METHOD FOR APPLYING PERSONAL DATA PROCESSING POLICIES FOR AN IoT DEVICE | 2021 |
|
RU2767714C1 |
METHOD FOR CONFIGURATION OF IoT APPARATUSES DEPENDING ON THE TYPE OF NETWORK | 2021 |
|
RU2760625C1 |
METHOD FOR CONTROLLING AN IoT APPARATUS FROM THE SIDE OF AN ELEMENT OF THE NETWORK INFRASTRUCTURE | 2021 |
|
RU2769632C1 |
Authors
Dates
2015-04-10—Published
2013-08-05—Filed