FIELD: radio engineering, communication.
SUBSTANCE: in the method, the initial graph of the communication network is formed, reflecting the topology and structure of the communication network, the set of N reference packets is stored, the log of the processed traffic is created on each routing node of the specified network, and when the k-th message packet passes its header is stored in the log, check the incoming data packets for compliance with the specified rules and in accordance with them make a conclusion about the presence of an attack, record the time of its detection and send a formalized request to all nodes of the network, the comparison operation on the routing nodes of the information from the logs with the received query is obtained, a formalized response is received from the routing nodes, a variational series of the packet transit times with the detected attack attributes and the corresponding route of malicious traffic through the network are constructed, the first node of the variational series is identified as a node, the subscriber of which is the source of a remote attack.
EFFECT: increase the reliability of detection of the source of remote computer attacks.
5 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF ROUTING TRAFFIC, HAVING PRIORITY CLASS IN COMMUNICATION NETWORK, INCLUDING TWO AND MORE OPERATORS | 2016 |
|
RU2631144C1 |
METHOD FOR DETECTING REMOTE ATTACKS AGAINST AUTOMATIZED CONTROL SYSTEMS | 2004 |
|
RU2264649C1 |
METHOD OF SELECTING SAFE ROUTE IN COMMUNICATION NETWORK OF GENERAL USE | 2016 |
|
RU2640627C1 |
METHOD TO PROTECT INFORMATION COMPUTER NETWORKS AGAINST COMPUTER ATTACKS | 2012 |
|
RU2483348C1 |
METHOD OF PROCESSING NETWORK TRAFFIC DATAGRAMS FOR HIDING CORRESPONDING PAIRS OF SUBSCRIBERS OF INFORMATION-TELECOMMUNICATION SYSTEMS | 2014 |
|
RU2586840C1 |
METHOD FOR MASKING STRUCTURE OF COMMUNICATION NETWORK | 2021 |
|
RU2759152C1 |
METHOD FOR PROTECTING INFORMATION-COMPUTER NETWORKS AGAINST CYBER ATTACKS | 2016 |
|
RU2622788C1 |
METHOD FOR PROCESSING NETWORK TRAFFIC DATAGRAMS TO HIDE CORRESPONDING PAIRS OF SUBSCRIBERS OF INFORMATION AND TELECOMMUNICATION SYSTEMS | 2020 |
|
RU2763261C1 |
METHOD OF ANALYSING AND DETECTING MALICIOUS INTERMEDIATE NODES IN NETWORK | 2012 |
|
RU2495486C1 |
VOLUME DDOS ATTACKS PROTECTION SYSTEM AND METHOD | 2022 |
|
RU2791869C1 |
Authors
Dates
2017-08-22—Published
2016-04-18—Filed