FIELD: information technology.
SUBSTANCE: method provides forming of multiple trusted assemblies on rights of individual clients of communication operator, which is divided into r subsets, in the list of addresses the following data is registered: composition subsets for each of the corresponding pairs in the direction of transmission, a list of authorised IP addresses for each of the trusted nodes and subscribers of corresponding pairs. On the trusted units a traffic is generated, after extraction in the formed datagram of addresses of sender SA and recipient SB from a list of addresses one of number of authorised units allocated for this pair is selected, one of permitted IP addresses of sender and one of permitted IP address of the selected trusted node, the T number of intermediate trusted nodes is determining determined on a route of datagram transfer; IP address of the source and IP address of network datagram destination are selected as IP addresses of sender and the selected trusted node, the “option” field network datagram is populated with number of trusted intermediate nodes on a route of datagram transmission, after receiving a network datagram on a trusted node is checked the specified value T in the “option” field if T=0, then from a list of addresses one of the permitted IP addresses of the recipient and trusted node is selected, IP-address of the source and destination IP address are recorded into field “Source IP-address” and “Destination IP address” for network datagram; IP address selected for trusted node and recipient are transmitted over a communication channel as formed datagram.
EFFECT: high level of protection against unauthorised access at data exchange in a network.
3 cl, 4 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR PROCESSING NETWORK TRAFFIC DATAGRAMS TO HIDE CORRESPONDING PAIRS OF SUBSCRIBERS OF INFORMATION AND TELECOMMUNICATION SYSTEMS | 2020 |
|
RU2763261C1 |
METHOD OF PROCESSING NETWORK TRAFFIC DATAGRAMS FOR PROTECTING INFORMATION COMPUTER SYSTEMS (VERSIONS) | 2012 |
|
RU2472217C1 |
METHOD OF ROUTING TRAFFIC, HAVING PRIORITY CLASS IN COMMUNICATION NETWORK, INCLUDING TWO AND MORE OPERATORS | 2016 |
|
RU2631144C1 |
METHOD TO PROTECT INFORMATION COMPUTER NETWORKS AGAINST COMPUTER ATTACKS | 2012 |
|
RU2483348C1 |
METHOD FOR PROCESSING NETWORK TRAFFIC DATAGRAMS FOR DELIMITING ACCESS TO INFORMATIONAL AND COMPUTING RESOURCES OF COMPUTER NETWORKS | 2006 |
|
RU2314562C1 |
METHOD FOR PROTECTING INFORMATION-COMPUTER NETWORKS AGAINST CYBER ATTACKS | 2016 |
|
RU2622788C1 |
METHOD OF PROTECTING INFORMATION COMPUTER NETWORKS FROM COMPUTER ATTACKS | 2011 |
|
RU2472211C1 |
METHOD OF DETECTION OF COMPUTER ATTACKS IN INFORMATION AND TELECOMMUNICATION NETWORK | 2013 |
|
RU2531878C1 |
METHOD OF TRANSMITTING DATA WITH GIVEN QUALITY IN A COMMUNICATION SYSTEM WHICH DOES NOT PROVIDE A THROUGH COMPOSITE INFORMATION CHANNEL AT ANY TIME | 2020 |
|
RU2734021C1 |
METHOD FOR PROTECTING INFORMATION-COMPUTER NETWORK AGAINST UNAUTHORIZED IMPACT | 2016 |
|
RU2635256C1 |
Authors
Dates
2016-06-10—Published
2014-12-10—Filed