FIELD: computer engineering.
SUBSTANCE: invention relates to computer engineering. Method of detecting unauthorized use of network devices of limited functionality and prevention of distributed attacks consists in the fact that reduced functionality devices send a message-protected message containing a network address to the gateway analysis module when detecting intrinsic abnormal activity; in analysis module checking whether messages are authentic; calculating a parameter characterizing the relationship between authentic messages; checking in the analysis module the performance of the condition of unauthorized use of devices of limited functionality, and if the condition is met, then forming a list of network addresses of devices of limited functionality, for which there is a conclusion on their unauthorized use, requesting gateway network traffic listed in the list of devices, analyzing network activity listed in the list of devices for signs of outgoing distributed attack, in case of detection, rules of filtering network traffic are formed, filtering rules are applied in gateway, preventing coordinated distributed network attack on the side of network devices of limited functionality until conditions of unauthorized use of devices are fulfilled in gateway analysis module.
EFFECT: detection of unauthorized use of network devices of limited functionality from a local network and prevention of distributed network attacks on network nodes in a global network directly in the attack source.
10 cl
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD FOR ACTIVE DETECTION OF MALICIOUS NETWORK RESOURCES | 2021 |
|
RU2769075C1 |
METHOD FOR DETECTING ANOMALOUS WORK OF NETWORK SERVER (OPTIONS) | 2016 |
|
RU2630415C2 |
METHOD FOR DETECTING NORMAL REACTIONS OF COMPUTER NETWORK NODES TO NETWORK PACKETS RELATED TO UNKNOWN TRAFFIC | 2022 |
|
RU2802164C1 |
METHOD OF PROCESSING NETWORK TRAFFIC DATAGRAMS FOR HIDING CORRESPONDING PAIRS OF SUBSCRIBERS OF INFORMATION-TELECOMMUNICATION SYSTEMS | 2014 |
|
RU2586840C1 |
PROTECTION METHOD OF VEHICLE CONTROL SYSTEMS AGAINST INTRUSIONS | 2019 |
|
RU2737229C1 |
CLOUD SERVICE SECURITY BROKER AND PROXY | 2014 |
|
RU2679549C2 |
METHOD AND SYSTEM FOR TUNNELING TRAFFIC IN DISTRIBUTED NETWORK | 2023 |
|
RU2820803C1 |
METHOD FOR AUTOMATIC CLASSIFICATION OF NETWORK TRAFFIC BASED ON HEURISTIC ANALYSIS | 2018 |
|
RU2690758C1 |
SYSTEM AND METHOD OF REDUCING FALSE RESPONSES WHEN DETECTING NETWORK ATTACK | 2011 |
|
RU2480937C2 |
PROTECTION METHOD OF VIRTUAL PRIVATE COMMUNICATION NETWORKS ELEMENTS FROM DDOS-ATTACKS | 2016 |
|
RU2636640C2 |
Authors
Dates
2019-10-16—Published
2018-11-30—Filed