FIELD: computer technology.
SUBSTANCE: method of protecting computer networks is intended for use in attack detection systems in order to counteract quickly unauthorized influences in computer data transmission networks based on the TCP/IP family of communication protocols. A fragmented response is sent to the sender, fragments of which are sent at numerous small delay time intervals, after many intermediate responses sent at numerous small delay time intervals. Responses are sent to the sender, indicating the temporary unavailability of the recipient of e-mail messages, at numerous small delay time intervals. False responses are sent to the sender, containing a randomly selected error code in accordance with the SMTP protocol specification.
EFFECT: increased effectiveness of protection by reducing the possibility of a hacker detecting the fact of using security tools and preventing the collection of valid email recipient addresses for use as potential attack targets.
10 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR PROTECTING COMPUTING NETWORKS | 2020 |
|
RU2745004C1 |
METHOD FOR PROTECTING COMPUTING NETWORKS | 2020 |
|
RU2754101C1 |
METHOD FOR PROTECTING COMPUTER NETWORKS | 2023 |
|
RU2810193C1 |
METHOD OF PROTECTION OF INFORMATION SYSTEMS | 2023 |
|
RU2805368C1 |
METHOD OF PROTECTING OF COMPUTER NETWORKS | 2019 |
|
RU2716220C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2696330C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2690749C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2686023C1 |
METHOD FOR COMMUNICATION NETWORK STRUCTURE MASKING | 2023 |
|
RU2794532C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2019 |
|
RU2726900C1 |
Authors
Dates
2021-05-11—Published
2020-09-10—Filed