METHOD OF MODELING OF "MAN IN THE MIDDLE" TYPE NETWORK ATTACK Russian patent published in 2018 - IPC H04W16/22 G06N7/06 G06N7/04 H04L12/00 

Abstract RU 2645294 C1

FIELD: radio engineering, communication.

SUBSTANCE: method of modelling a network attack of the type "man in the middle" consists in setting and recording the parameters characterizing the topology of the computer communication network (CCN), the frequency and intensity of the impact into the memory cells of the personal computer (PC), creating a physical model of the CCN direction, modelling the functioning of the CCN, simulating the effects on communication systems, measuring, remembering the indicators characterizing the main parameters of the effect, making corrections (changes) in the physical models of objects, measuring, counting, recording to the cells of the operational PC memory the basic values of the characteristics of the simulated impacts, characterized by setting parameters that characterize the process of packet transfer in a unified telecommunication network (UTN), creating a physical model for the direction of the CCN, an UTN fragment comprising two PCs simulating the CCN network nodes, a router controlled by a PC, simulating an UTN fragment, a router controlled by a PC simulating a network attack on the "man in the middle" CCN, installing the required software for running the PC in the UTN, specifying IP addresses, setting the required software and configuring a router controlled by a PC that simulates an UTN fragment and a control computer, a PC running by the router, replaces the transmitted packets and provides a simulated possible error probability, delay and jitter in the normal operation of the UTN, installing the required software and configuring the router, a controlled computer simulating a destructive "man in the middle" effect, and a control PC, the PC controlling the router, replaces the transmitted packets, or delays transmitted packets in order to disrupt the communication session, while modelling the operation of the CCN using the network resource of the UTN without the "man in the middle" network attack, transmitting the given information sequence and randomly changing the transmitted sequence and delaying transmitting, simulating the transmission to the UTN, in the router simulating the UTN fragment, simulations are performed for different transmission rates, different software and various UTN fragments.

EFFECT: increased reliability of results evaluation of modelling a network attack of the man in the middle type, by taking into account the distribution of transmitted packets in a unified telecommunication network and estimating the necessary resource for performing an effective network attack of man in the middle type.

2 dwg

Similar patents RU2645294C1

Title Year Author Number
METHOD OF PROTECTION FROM SIMULTANEOUSLY COMPUTER ATTACKS 2017
  • Zakalkin Pavel Vladimirovich
  • Dobryshin Mikhail Mikhajlovich
  • Starodubtsev Yurij Ivanovich
  • Gutsyn Ruslan Viktorovich
  • Karajchev Sergej Yurevich
RU2663473C1
METHODOLOGY FOR ESTIMATING SERVICE QUALITY PARAMETERS USING AN ANALYTICAL AND SIMULATION MODEL OF AN INFOCOMMUNICATION NETWORK WITH REAL-TIME TRAFFIC PROCESSING 2021
  • Reziapkina Magdalina Igorevna
  • Buranova Marina Anatolevna
RU2776023C1
SECURE VIDEO CONFERENCING QUALITY ASSESSMENT SYSTEM 2023
  • Dobryshin Mikhail Mikhailovich
  • Gorbulia Dmitrii Sergeevich
  • Belov Andrei Sergeevich
  • Shugurov Dmitrii Evgenevich
  • Reformat Andrei Nikolaevich
  • Mishenin Viktor Anatolevich
  • Mazur Vasilii Vasilevich
  • Gromov Iurii Iurevich
RU2813361C1
SYSTEM FOR SELECTING MEANS AND METHODS OF PROTECTING ORGANIZATIONAL AND TECHNICAL SYSTEMS FROM GROUP HETEROGENEOUS INFORMATION AND TECHNICAL IMPACTS 2019
  • Dobryshin Mikhail Mikhajlovich
  • Zakalkin Pavel Vladimirovich
  • Gutsyn Ruslan Viktorovich
  • Manzyuk Viktor Valentinovich
  • Chuklyaev Ilya Igorevich
  • Chizhankov Andrej Vladimirovich
  • Shevchenko Aleksandr Leontevich
RU2728289C1
METHOD FOR EVALUATING THE ABILITY OF A COMPUTER NETWORK NODE TO OPERATE UNDER CONDITIONS OF INFORMATION AND TECHNICAL IMPACT 2016
  • Grechishnikov Evgenij Vladimirovich
  • Dobryshin Mikhail Mikhajlovich
  • Zakalkin Pavel Vladimirovich
  • Gorelik Sergej Petrovich
  • Belov Andrej Sergeevich
  • Skubev Aleksandr Vasilevich
RU2648508C1
METHOD FOR ENSURING COVERTNESS OF OPERATION OF ELEMENTS OF A COMMUNICATION SYSTEM UTILISING THE RESOURCES OF A PUBLIC COMMUNICATION NETWORK 2021
  • Starodubtsev Iurii Ivanovich
  • Permiakov Aleksandr Sergeevich
  • Lepeshkin Oleg Mikhailovich
  • Vershennik Elena Valerevna
  • Vershennik Aleksei Vasilevich
  • Karpov Mikhail Andreevich
  • Kletskov Dmitrii Aleksandrovich
  • Ostroumov Oleg Aleksandrovich
RU2772548C1
METHOD FOR INCREASING THE STABILITY OF INFORMATION TRANSMISSION THROUGH COMMUNICATION CHANNELS OF VIRTUAL PRIVATE NETWORKS 2021
  • Karpov Sergey Sergeevich
  • Balyuk Aleksey Anatolevich
  • Globin Uriy Olegovich
  • Ryabinin Uriy Evgenevich
RU2755684C1
METHOD FOR DETECTING REMOTE ATTACKS IN COMPUTER NETWORK 2000
  • Vil'Chevskij N.O.
  • Zaborovskij V.S.
  • Klavdiev V.E.
  • Lopota V.A.
  • Malenkova A.V.
RU2179738C2
METHOD OF CONSTRUCTION OF DISTRIBUTED CONTROL POINT IN CONDITIONS OF OPENING AND EXTERNAL DESTRUCTIVE EFFECTS OF ATTACKER 2018
  • Grechishnikov Evgenij Vladimirovich
  • Belov Andrej Sergeevich
  • Sanin Yurij Vasilevich
  • Shumilin Vyacheslav Sergeevich
  • Tsitsin Egor Alekseevich
RU2676893C1
NETWORK ARCHITECTURE OF AN ANTHROPOID NETWORK AND A METHOD OF REALIZING 2017
  • Dai Jingyou
  • Yu Shaohua
RU2704538C1

RU 2 645 294 C1

Authors

Makarov Vladimir Nikolaevich

Grechishnikov Evgenij Vladimirovich

Shugurov Dmitrij Evgenevich

Dobryshin Mikhail Mikhajlovich

Remizov Yurij Anatolevich

Dates

2018-02-19Published

2016-11-14Filed