FIELD: radio engineering, communication.
SUBSTANCE: method of modeling the damage caused by network and computer attacks to virtual private networks is that a communication system including N structural elements and connections between them, where n=1, 2,…, N, unfold to the working state, fix destabilizing effects on its structural elements, according to the obtained data, a simulation model of the communication system is formed, destabilizing effects are modelled thereon; according to the simulation results, the imitation model of the communication system is reconfigured and the probability of its functioning disturbing from destabilizing effects is calculated; the functioning of the system under conditions of exogenous destructive effect also the data are counted and stored on the mn number of actions to the n-th element of the communication system, the number Nb of the communication system elements subjected to destructive external effects, and the simulation model is formed by the data obtained, reconfiguring it after each effect, the calculated reliability value of the communication system opening structure affecting a party with a predefined threshold confidence level is compared, when exceeding the values of the calculated reliability above the threshold a functioning network connection is proactively reconfigured. The parameters of the network traffic of the subscribers of the "White" List of IP addresses are measured, the parameters of functioning the virtual private network element are determined, in which it is possible to provide the subscriber with the required communication services, the measured parameter values are stored in memory cells, the maximum deviation from the statistical values of the measured parameters is set and the values of parameters of normal subscriber behavior from the "White" List of IP addresses are described, physical models of normal subscriber behavior of virtual private network, computer and network attacks and attack detection systems are created, the models in the database are stored, the places are determined and the sensors of the attack detection systems are placed, the desired values are defined for the speed attack detection systems, the "White" Lists of IP addresses of the virtual private network subscribers are defined and supplemented, the rules of the network traffic filtration are defined and supplemented, based on behavioral criteria, including analysis of the measured parameters of the attacks, options for reconfiguration of the virtual private network are developed, simultaneous effects of several different computer and network attacks of the virtual private network are simulated with different load network traffic of the virtual private network subscribers, the performance of the detection system is measured, the system performance of the effecr detection is evaluated.
EFFECT: increasing the reliability of simulation results by simultaneous simulating the destructive effects of several network and computer attacks, increasing the security of VPN elements, by evaluating the projected damage to the VPN element and conducting a proactive VPN reconfiguration based on this evaluation.
5 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR INCREASING THE STABILITY OF INFORMATION TRANSMISSION THROUGH COMMUNICATION CHANNELS OF VIRTUAL PRIVATE NETWORKS | 2021 |
|
RU2755684C1 |
PROTECTION METHOD OF VIRTUAL PRIVATE COMMUNICATION NETWORKS ELEMENTS FROM DDOS-ATTACKS | 2016 |
|
RU2636640C2 |
METHOD OF REDUCING DAMAGE CAUSED BY NETWORK ATTACKS TO A VIRTUAL PRIVATE NETWORK | 2018 |
|
RU2685989C1 |
METHOD OF PROTECTING NODES OF VIRTUAL PRIVATE COMMUNICATION NETWORK FROM DDoS-ATTACKS WITH METHOD OF MANAGING QUANTITY OF RENDERED COMMUNICATION SERVICES TO SUBSCRIBERS | 2018 |
|
RU2675900C1 |
METHOD OF USING OPTIONS OF COUNTERMEASURE OF NETWORK AND STREAM COMPUTER INTELLIGENCE AND NETWORK ATTACKS AND SYSTEM THEREFOR | 2018 |
|
RU2682108C1 |
RISK MANAGEMENT MODELING TECHNIQUE FOR INFORMATION-MANAGEMENT SYSTEM AT INFORMATION-TECHNICAL IMPACTS CONDITIONS | 2016 |
|
RU2634169C1 |
METHOD FOR EVALUATING THE ABILITY OF A COMPUTER NETWORK NODE TO OPERATE UNDER CONDITIONS OF INFORMATION AND TECHNICAL IMPACT | 2016 |
|
RU2648508C1 |
VIRTUAL NETWORK SIMULATION METHOD | 2020 |
|
RU2741262C1 |
METHOD OF MODELING OF "MAN IN THE MIDDLE" TYPE NETWORK ATTACK | 2016 |
|
RU2645294C1 |
METHOD OF PROTECTING COMMUNICATION NETWORK SERVICE SERVERS AGAINST COMPUTER ATTACKS | 2019 |
|
RU2718650C1 |
Authors
Dates
2017-07-11—Published
2016-03-11—Filed