FIELD: computing technology.
SUBSTANCE: method for routing traffic within a distributed network for detonating malicious content comprises steps at which at least one emitter sends at least one packet of outgoing traffic to at least one central server, where at least one packet of outgoing traffic contains at least two levels encapsulation over transport protocol implemented to forward a packet of outgoing traffic by at least one central server to at least one gateway for NAT and extract, in response to receiving at least one packet of incoming traffic from at least one central server, from at least at least one packet of incoming traffic potentially malicious content, where at least one packet of incoming traffic was previously received by at least one central server from at least one gateway, then potentially malicious content is analysed and its detonation is achieved.
EFFECT: multi-layer tunnelling for traffic transmission within a distributed network to analyse suspicious traffic.
18 cl, 6 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD AND SYSTEM FOR TUNNELING TRAFFIC IN DISTRIBUTED NETWORK | 2023 |
|
RU2820803C1 |
METHOD AND SYSTEM FOR ACCELERATED TUNNELING OF TRAFFIC IN DISTRIBUTED NETWORK FOR DETONATION OF MALICIOUS SOFTWARE | 2023 |
|
RU2832621C1 |
METHOD OF CREATING A SECURE L2-CONNECTION BETWEEN PACKET SWITCHED NETWORKS | 2018 |
|
RU2694585C1 |
COMPUTING APPARATUS AND METHOD FOR IDENTIFYING COMPROMISED APPARATUSES BASED ON DNS TUNNELLING DETECTION | 2021 |
|
RU2777348C1 |
SYSTEM AND METHOD OF AUTOGENERATION OF DECISION RULES FOR INTRUSION DETECTION SYSTEMS WITH FEEDBACK | 2016 |
|
RU2634209C1 |
METHOD FOR PROTECTION OF COMPUTER NETWORKS | 2022 |
|
RU2789810C1 |
WIRELESS INITIALIZATION DEVICE | 2001 |
|
RU2269873C2 |
METHOD FOR PROTECTING COMPUTER NETWORKS | 2023 |
|
RU2805354C1 |
DYNAMIC SECURE COMMUNICATION NETWORK AND PROTOCOL | 2016 |
|
RU2769216C2 |
DYNAMIC SECURE COMMUNICATION NETWORK AND PROTOCOL | 2016 |
|
RU2707715C2 |
Authors
Dates
2023-06-01—Published
2022-05-27—Filed