FIELD: computer equipment.
SUBSTANCE: technical result is achieved by a method of implementing security policy rules in peer-to-peer communication networks of cyber physical devices, comprising a security policy implementation unit, in which security policy rules are formed in form of an access matrix between cyber physical devices, receive requests for network access between cyber physical devices, generate and forward control commands to cyber physical devices, by changing their routing tables and thereby determining routes of forwarding packets allowed by security policy rules from one device to another, forming safety policy rules for a peer-to-peer communication network of cyber physical devices in the form of an access matrix, in which headers of rows and columns list all cyber physical devices in the network based on their IP addresses, in the cells at the intersection of rows and columns, the authorized access flag is indicated, if access for the corresponding pair of cyber physical devices is allowed, wherein the empty cell corresponds to forbidden access.
EFFECT: technical result is high cyberstability and information security of a network of cyber physical devices.
1 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF CONTROLLING ACCESS BETWEEN DEVICES IN INTER-MACHINE DATA NETWORKS | 2018 |
|
RU2714853C1 |
METHOD OF SAFE ROUTING IN PEER SELF ORGANIZATION NETWORKS | 2017 |
|
RU2668222C1 |
METHOD OF CONTROLLING COMMUNICATION OF SINGLE-RANGE INTERCOMPUTER DATA NETWORK | 2017 |
|
RU2666306C1 |
METHOD FOR PROTECTING COMPUTER NETWORK AGAINST INTRUSION | 2021 |
|
RU2758997C1 |
METHOD OF GENERATING A UNIVERSAL INPUT SIGNAL FOR NEURON NETWORK INTRUSION DETECTOR IN INTER-MACHINE NETWORKS | 2018 |
|
RU2702274C1 |
METHOD FOR REMOTE MONITORING AND CONTROL OF NETWORKING INFORMATION SECURITY BASED ON USE OF DOMAIN NAME SYSTEM | 2012 |
|
RU2503059C1 |
METHOD FOR CENTRALISED CONTROL OF ACCESS OF CONTROL SYSTEMS TO ACTIVE NETWORK EQUIPMENT IN DISTRIBUTED COMPUTER SYSTEMS AND SYSTEM THEREFOR | 2013 |
|
RU2580815C2 |
METHOD OF PREDICTING AND EVALUATING SAFETY OF ACCESSIBLE STATES OF PROTECTED INFORMATION SYSTEMS | 2008 |
|
RU2394271C1 |
MOVEMENT OF NETWORK TRAFFIC RELATIVE TO TRANSIT NET POINTS WITH DIFFERENTIATED LIMITATION | 2005 |
|
RU2358399C2 |
TERMINAL CONTROL DEVICE, COMMUNICATION METHOD, COMMUNICATION SYSTEM, COMMUNICATION MODULE, PROGRAM AND INFORMATION PROCESSING DEVICE | 2012 |
|
RU2586587C2 |
Authors
Dates
2020-02-13—Published
2019-07-05—Filed