FIELD: computer equipment.
SUBSTANCE: method of protecting computer networks involves transmitting a packet to a single false computer network; after unauthorized flow identification value of coincidence coefficients Qmatch is calculated and in case of its exceeding, a service packet is formed for the computer network protection means Mk on the need to lock an unauthorized information stream and transmit it to the corresponding computer network, and if condition Qmatch≥Qmatch. porc is satisfied generating a response message packet, for which previously recorded IP addresses of the sender and recipient of subscribers of the computer network Mk are recorded in the header, and transmitted.
EFFECT: technical result is improved efficiency of the protection system, including reliability of detecting unauthorized impact on a computer network, due to significant reduction in the number of elements of a false computer network and formation of a single set of sequences of acts of intruder.
1 cl, 2 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR PROTECTION OF COMPUTER NETWORKS | 2012 |
|
RU2475836C1 |
METHOD OF PROTECTING COMPUTER NETWORKS WITH IDENTIFICATION OF MULTIPLE SIMULTANEOUS ATTACKS | 2019 |
|
RU2739206C1 |
METHOD FOR PROTECTING COMPUTING NETWORKS FROM COMPUTER ATTACKS DIRECTED ON VARIOUS NODES AND INFORMATION RESOURCES | 2021 |
|
RU2782704C1 |
METHOD OF PROTECTING COMPUTER NETWORKS BASED ON ADAPTIVE INTERACTION | 2019 |
|
RU2715165C1 |
METHOD FOR PROTECTION OF COMPUTER NETWORKS BASED ON LEGENDIZING | 2023 |
|
RU2814463C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2674802C1 |
METHOD (VARIANTS) FOR PROTECTING COMPUTER NETWORKS | 2006 |
|
RU2307392C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2017 |
|
RU2649789C1 |
METHOD FOR CONTROLLING INFORMATION STREAMS IN DIGITAL COMMUNICATION NETWORKS | 2004 |
|
RU2267154C1 |
METHOD OF PROTECTION OF INFORMATION SYSTEMS | 2023 |
|
RU2805368C1 |
Authors
Dates
2019-08-02—Published
2018-12-24—Filed