FIELD: security means.
SUBSTANCE: invention relates to the field of information security technologies. Disclosed is the DDoS-attacks determining hardware and software system, which contains protection means against the DDoS-attacks, the server containing the services, accessed by users by querying the server, information security tools, hardware with built-in security mechanisms, and the administration tool; at that, the information security tools and hardware with built-in protection mechanisms can receive information from services and configure them, and also exchange information with the security tool against DdoS-attacks; the administration tool is designed to configure the information security responsible tools, and hardware with built-in protection mechanisms; at that, the security tool against DDoS-attacks is designed to: intercept requests from users to the server; selection of data and their parameters from the user requests; constructing the user vector from selected data and their parameters from the intercepted requests; comparing the user vector with the reference user vector; determining the DDoS-attack on a server in the event that: a user vector is different from the reference user vector, the data parameters from user requests are characteristic of a DDoS-attack on a server.
EFFECT: technical result consists in enabling of the DDoS-attacks definition.
6 cl, 9 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD OF DETERMINATION OF DDOS-ATTACKS UNDER FAILURE OF SERVICE SERVERS | 2017 |
|
RU2665919C1 |
SYSTEM AND METHOD OF SETTING SECURITY SYSTEMS UNDER DDOS ATTACKS | 2017 |
|
RU2659735C1 |
SYSTEM AND METHOD OF REDUCING FALSE RESPONSES WHEN DETECTING NETWORK ATTACK | 2011 |
|
RU2480937C2 |
METHOD AND SYSTEM FOR PREVENTING MALICIOUS AUTOMATED ATTACKS | 2021 |
|
RU2768567C1 |
SYSTEM AND METHOD FOR CHECKING WEB RESOURCES FOR PRESENCE OF MALICIOUS COMPONENTS | 2010 |
|
RU2446459C1 |
METHOD AND SYSTEM FOR PREVENTING MALICIOUS AUTOMATED ATTACKS | 2020 |
|
RU2740027C1 |
METHOD FOR ELIMINATING VULNERABILITIES OF DEVICES HAVING ACCESS TO INTERNET | 2016 |
|
RU2636700C1 |
REMEDIAL METHOD FOR ROUTER VULNERABILITIES | 2016 |
|
RU2614559C1 |
METHOD FOR CREATING AND APPLYING AN APPLICATION INTERACTION RULE ON AN IOT DEVICE | 2021 |
|
RU2757651C1 |
METHOD FOR CONFIGURATION OF IoT APPARATUSES DEPENDING ON THE TYPE OF NETWORK | 2021 |
|
RU2760625C1 |
Authors
Dates
2018-12-25—Published
2017-07-17—Filed