FIELD: radio engineering, communication.
SUBSTANCE: invention can be used in protection systems against unauthorized impact by predicting the occurrence and elimination of vulnerabilities during scaling and other changes in the information-computer network (ICT) simultaneously with its operation. The ICT vulnerabilities are identified, analyzed and evaluated prior to the use of the packet transmission route in it, the occurrence of new routes due to the ICT scaling and other network changes and quantitative estimation of its vulnerability when making a decision to eliminate the vulnerability are considered, which will reduce the time for detecting an attack and the time of making a decision to localize the attack. At the same time, the average time for detecting and eliminating vulnerabilities and will decrease, it follows that the exponent of the ICT working time is increasing.
EFFECT: increasing protection of the information-computer network while providing the structural reliability of the information-computer network by pointing out and blocking network elements with functional failures, reducing network downtime and thereby improving the stability of the information-computing network operation.
10 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF PROTECTING AN INFORMATION NETWORK FROM INTRUSIONS | 2019 |
|
RU2705773C1 |
METHOD OF PROTECTING INFORMATION COMPUTER NETWORKS FROM COMPUTER ATTACKS | 2011 |
|
RU2472211C1 |
METHOD OF DETECTION OF COMPUTER ATTACKS IN INFORMATION AND TELECOMMUNICATION NETWORK | 2013 |
|
RU2531878C1 |
METHOD TO PROTECT INFORMATION COMPUTER NETWORKS AGAINST COMPUTER ATTACKS | 2012 |
|
RU2483348C1 |
METHOD FOR PROTECTING INFORMATION AND TELECOMMUNICATION NETWORK FROM PASSIVE COMPUTER ATTACKS | 2016 |
|
RU2642403C1 |
METHOD FOR PROTECTING INFORMATION-COMPUTER NETWORKS AGAINST CYBER ATTACKS | 2016 |
|
RU2622788C1 |
METHOD FOR PROTECTING COMPUTING NETWORKS FROM COMPUTER ATTACKS DIRECTED ON VARIOUS NODES AND INFORMATION RESOURCES | 2021 |
|
RU2782704C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2682432C1 |
METHOD TO PROVIDE INFORMATION SECURITY DURING USER ACCESS TO EXTERNAL INFORMATION RESOURCES VIA INTERNET | 2011 |
|
RU2445692C1 |
METHOD OF PROTECTING OF COMPUTER NETWORKS | 2019 |
|
RU2716220C1 |
Authors
Dates
2017-11-09—Published
2016-05-04—Filed