FIELD: information technologies.
SUBSTANCE: invention relates to the attacks detection with the aim of prompt detecting and countering unauthorized influences in computer networks. Remembering the authorized information flows reference identifiers, which allows to detect unauthorized influences on the computer network at the initial stage and block them. If the intruder addresses to the predetermined false addresses of the computer network subscribers, the response messages packets are transmitted with excessive fragmentation and a decrease in the transmission rate, which simulates the poor quality communication channel. Recording the maximum number of received and unprocessed messages packets, which the computer network can process without overload. Keeping in two-way communication order with the messages packets sender while increasing the unauthorized information flows intensity causing overload, and blocking the sender attempts to disconnect. This provides an increase in the destructive impact subject discomfort and advantage in time for the information security service, which is necessary for the implementation of the trace formation mechanisms and response measures.
EFFECT: technical result is increase in the protection effectiveness and misleading the offender with respect to the computer network structure due to the accounting if the maximum number of messages received from the sender and unprocessed messages packets, which the computer network can process without overload, in a two-way keeping connection with the messages packets sender with the increase in the unauthorized information flows intensity and blocking the sender attempts to break the connection.
1 cl, 9 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2696330C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2686023C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2680038C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2690749C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2682432C1 |
METHOD FOR PROTECTION OF COMPUTER NETWORKS | 2012 |
|
RU2475836C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2696549C1 |
METHOD (VARIANTS) FOR PROTECTING COMPUTER NETWORKS | 2006 |
|
RU2307392C1 |
METHOD OF PROTECTING COMPUTER NETWORKS BASED ON ADAPTIVE INTERACTION | 2019 |
|
RU2715165C1 |
METHOD OF PROTECTION OF INFORMATION SYSTEMS | 2023 |
|
RU2805368C1 |
Authors
Dates
2018-04-04—Published
2017-07-17—Filed