FIELD: computer engineering.
SUBSTANCE: invention is aimed to increase the degree of protection by reducing the ability of an offender to compromise security measures and mislead him. It is achieved due to the fact that in the event of detection of unauthorized flows, the lease of previously assigned network parameters of network devices in the source subnet is completed. Next, a network device is specified in the source subnet to generate and direct false network traffic; assigning new network parameters in the new subnet to all network devices except the specified network device for generating and directing false network traffic; comparing the calculated self-similarity index of network traffic with a plurality of values. If they do not match, false traffic with completely random parameters is sent to the source subnet; otherwise, a fractal Gaussian noise is generated for each of the network traffic parameters, according to which information flows of self-similar network traffic are sent to the source subnetwork for a given time. After a specified time has elapsed, the decoy network traffic is directed to the original subnet, and the designated network device is assigned new network parameters in the new subnet.
EFFECT: increased degree of protection by reducing the ability of an offender to compromise security measures and mislead him.
8 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR PROTECTION OF COMPUTER NETWORKS | 2022 |
|
RU2789810C1 |
METHOD FOR PROTECTING COMPUTER NETWORKS | 2023 |
|
RU2810193C1 |
METHOD OF PROTECTING OF COMPUTER NETWORKS | 2019 |
|
RU2716220C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2019 |
|
RU2726900C1 |
METHOD FOR COMMUNICATION NETWORK STRUCTURE MASKING | 2023 |
|
RU2794532C1 |
METHOD FOR COMMUNICATION NETWORK STRUCTURE MASKING | 2022 |
|
RU2793104C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2680038C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2686023C1 |
METHOD FOR MASKING STRUCTURE OF COMMUNICATION NETWORK | 2021 |
|
RU2759152C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2690749C1 |
Authors
Dates
2023-10-16—Published
2023-01-17—Filed