FIELD: protection of computer networks.
SUBSTANCE: system comprises an internal corporate and external network, and also additionally comprises a firewall designed to analyse and filter incoming and outgoing traffic based on rules developed by the security administrator, and using mechanisms to check traffic for malware and vulnerabilities, connected on one side with the core of the internal corporate network, to which n user workstations are connected, separated by VLANn virtual local networks, and on the other hand, with a DDoS protection system connected, in turn, to the external network and providing firewall protection from failure when trying to multiply the number of established sessions per unit of time.
EFFECT: increasing the security of information circulating in a corporate network connected to an external network, without complicating the procedure for user access to the external network and the procedure for exchanging data between the corporate and external networks.
3 cl, 1 dwg
Title | Year | Author | Number |
---|---|---|---|
ROBUST AND SECURE HARDWARE-COMPUTER SYSTEM IN CLOUD COMPUTING ENVIRONMENT | 2013 |
|
RU2557476C2 |
SYSTEM AND METHOD OF DETECTING THE SIGNS OF COMPUTER ATTACKS | 2017 |
|
RU2661533C1 |
SYSTEM AND METHOD FOR ANALYSING INCOMING TRAFFIC FLOW | 2023 |
|
RU2812087C1 |
SYSTEM AND METHOD OF CORRELATING EVENTS FOR DETECTING INFORMATION SECURITY INCIDENT | 2019 |
|
RU2739864C1 |
METHOD FOR ADJUSTING THE PARAMETERS OF A MACHINE LEARNING MODEL IN ORDER TO IDENTIFY FALSE TRIGGERING AND INFORMATION SECURITY INCIDENTS | 2020 |
|
RU2763115C1 |
METHOD FOR ADAPTIVE CONTROL OF SYSTEM FOR ENSURING INFORMATION SECURITY OF CORPORATE COMMUNICATION NETWORK | 2023 |
|
RU2823575C1 |
METHOD FOR PROCESSING INFORMATION SECURITY EVENTS PRIOR TO TRANSMISSION FOR ANALYSIS | 2020 |
|
RU2762528C1 |
METHOD OF MODELING DAMAGE EVALUATION CAUSED BY NETWORK AND COMPUTER ATTACKS TO VIRTUAL PRIVATE NETWORKS | 2016 |
|
RU2625045C1 |
SYSTEM AND METHOD OF CREATING ANTIVIRUS RECORD | 2018 |
|
RU2697954C2 |
SYSTEM AND METHOD FOR IDENTIFYING MALICIOUS FILES | 2017 |
|
RU2673407C1 |
Authors
Dates
2023-08-04—Published
2022-07-13—Filed