FIELD: computer equipment.
SUBSTANCE: invention relates to the computer equipment. Method for protecting computer networks based on adaptive interaction, in which selection of an attack type from reference sets based on current and previous states during whole interaction with an intruder, at that, for adaptation of response messages are formed precisely according to current manifestations of unauthorized flows, which increases security of computer networks by changing interaction of false nodes with an intruder.
EFFECT: technical result consists in improvement of computer network security due to adaptation of interaction of false addresses of subscribers of a computer network with unauthorized information flows.
1 cl, 2 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR PROTECTION OF COMPUTER NETWORKS BASED ON LEGENDIZING | 2023 |
|
RU2814463C1 |
METHOD OF PROTECTING COMPUTER NETWORKS WITH IDENTIFICATION OF MULTIPLE SIMULTANEOUS ATTACKS | 2019 |
|
RU2739206C1 |
METHOD FOR PROTECTING COMPUTING NETWORKS FROM COMPUTER ATTACKS DIRECTED ON VARIOUS NODES AND INFORMATION RESOURCES | 2021 |
|
RU2782704C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2696549C1 |
METHOD FOR PROTECTION OF COMPUTER NETWORKS | 2012 |
|
RU2475836C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2674802C1 |
METHOD (VARIANTS) FOR PROTECTING COMPUTER NETWORKS | 2006 |
|
RU2307392C1 |
METHOD FOR CONTROLLING INFORMATION STREAMS IN DIGITAL COMMUNICATION NETWORKS | 2004 |
|
RU2267154C1 |
METHOD FOR PROTECTING COMPUTER NETWORKS AGAINST UNAUTHORIZED ATTACK | 2004 |
|
RU2271613C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2017 |
|
RU2649789C1 |
Authors
Dates
2020-02-25—Published
2019-10-23—Filed