FIELD: communications technology.
SUBSTANCE: invention relates to communications technology. The effect is achieved due to the fact that the transmitting side monitors the communication channel for destructive influences, as a result of which the network packet loss rate exceeds the permissible values, as well as for simulating data packets, in case of detection, the quality of the communication channel is evaluated, the parameters of error-correcting coding are determined: the number of information packets K, the number of redundant packets R, the size of the sliding window of N packets is determined, the transmitted sequence of N network packets is divided into groups of K information packets, an imitation insertion is generated, for each sequence of K information packets R redundant packets are generated, linearly dependent on K packets , for each of the R redundant packets, a simulated insertion is generated, then the packets are transmitted to the receiving side, where the imitation insertion is checked, the packets that have not passed the test are erased, an error-correcting code is formed from the checked packets, which is then decoded, the imitation insertion is checked in the restored packets.
EFFECT: increasing the speed of information transmission in conditions of the destructive impact of an attacker.
1 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF MODELING DAMAGE EVALUATION CAUSED BY NETWORK AND COMPUTER ATTACKS TO VIRTUAL PRIVATE NETWORKS | 2016 |
|
RU2625045C1 |
METHOD OF PROTECTING NODES OF VIRTUAL PRIVATE COMMUNICATION NETWORK FROM DDoS-ATTACKS WITH METHOD OF MANAGING QUANTITY OF RENDERED COMMUNICATION SERVICES TO SUBSCRIBERS | 2018 |
|
RU2675900C1 |
METHOD AND DEVICE FOR PROTECTING DATA TRANSMITTED USING BLOCK SEPARABLE CODES FROM INTRUDER IMITATING ACTIONS | 2019 |
|
RU2738789C1 |
PROTECTION METHOD OF VIRTUAL PRIVATE COMMUNICATION NETWORKS ELEMENTS FROM DDOS-ATTACKS | 2016 |
|
RU2636640C2 |
VIRTUAL NETWORK SIMULATION METHOD | 2020 |
|
RU2741262C1 |
METHOD FOR DETECTING REMOTE ATTACKS IN COMPUTER NETWORK | 2000 |
|
RU2179738C2 |
METHOD AND SYSTEM OF CYBER TRAINING | 2022 |
|
RU2808388C1 |
METHOD FOR EVALUATING THE ABILITY OF A COMPUTER NETWORK NODE TO OPERATE UNDER CONDITIONS OF INFORMATION AND TECHNICAL IMPACT | 2016 |
|
RU2648508C1 |
METHOD OF USING OPTIONS OF COUNTERMEASURE OF NETWORK AND STREAM COMPUTER INTELLIGENCE AND NETWORK ATTACKS AND SYSTEM THEREFOR | 2018 |
|
RU2682108C1 |
METHOD OF REDUCING DAMAGE CAUSED BY NETWORK ATTACKS TO A VIRTUAL PRIVATE NETWORK | 2018 |
|
RU2685989C1 |
Authors
Dates
2021-09-20—Published
2021-03-15—Filed