FIELD: computer technology.
SUBSTANCE: invention relates to the field of computer technology for provision of security of information and communication networks for data transmission. A database of weight factors of network nodes is formed, a network traffic is monitored, during which attack sources – the latest node, from which IP packets come, defined with an attack detection system as dangerous and threatening for network functioning, are determined, a network graph is built, all possible network paths for all “attack source – protection object” pairs are determined, importance of nodes belonging to paths determined for all “attack source – protection object” pairs is assessed by calculating a node centrality value, taking into account weight factors of nodes: an attack source and a protection object, nodes are ranked by an importance degree, impossibility of reception and transmission of IP packets with nodes with the highest rank from attack sources is provided with available means, and the end of an attack to each protection object is checked, and, if the attack continues, actions, according to the method, are repeated, starting from calculation of node centrality.
EFFECT: increase in the reliability of assessment of importance of network nodes to provide network security.
1 cl, 2 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR EVALUATING THE ABILITY OF A COMPUTER NETWORK NODE TO OPERATE UNDER CONDITIONS OF INFORMATION AND TECHNICAL IMPACT | 2016 |
|
RU2648508C1 |
METHOD OF PROTECTING COMMUNICATION NETWORK SERVICE SERVERS AGAINST COMPUTER ATTACKS | 2019 |
|
RU2718650C1 |
ADAPTIVE INFORMATION AND TECHNICAL MONITORING SYSTEM | 2019 |
|
RU2728763C1 |
METHOD OF PROTECTING NODES OF VIRTUAL PRIVATE COMMUNICATION NETWORK FROM DDoS-ATTACKS WITH METHOD OF MANAGING QUANTITY OF RENDERED COMMUNICATION SERVICES TO SUBSCRIBERS | 2018 |
|
RU2675900C1 |
METHOD FOR PROTECTING INFORMATION AND TELECOMMUNICATION NETWORK FROM PASSIVE COMPUTER ATTACKS | 2016 |
|
RU2642403C1 |
METHOD FOR MASKING STRUCTURE OF COMMUNICATION NETWORK | 2021 |
|
RU2759152C1 |
METHOD OF USING OPTIONS OF COUNTERMEASURE OF NETWORK AND STREAM COMPUTER INTELLIGENCE AND NETWORK ATTACKS AND SYSTEM THEREFOR | 2018 |
|
RU2682108C1 |
METHOD FOR PROTECTION OF COMPUTER NETWORKS | 2022 |
|
RU2789810C1 |
METHOD OF SIMULATING VIRTUAL NETWORKS IN CONDITIONS OF DESTRUCTIVE SOFTWARE ACTIONS | 2018 |
|
RU2701994C1 |
METHOD FOR PRELIMINARY TARGETED RECONFIGURATION OF THE COMMUNICATION NETWORK, TAKING INTO ACCOUNT THE ASSESSMENT OF THE AWARENESS OF THE SOURCE OF INFORMATION AND TECHNICAL IMPACTS ON THE STRUCTURE OF THE COMMUNICATION NETWORK | 2021 |
|
RU2754271C1 |
Authors
Dates
2023-03-02—Published
2021-12-20—Filed