FIELD: computer engineering.
SUBSTANCE: in the method of protecting an information-computer network from unauthorized actions, measures to counter unauthorized actions are selected from a list of {P} and sending them to elements of information-computer network (ICN) subjected to unauthorized effects, in case selected measures from array {P} provided counteraction to unauthorized actions, then structure of ICN is left unchanged, and if not, then those multidimensional routes of delivery of data streams, which include one-dimensional routes with elements of ICN, subjected to unauthorized effects and not provided with the help of measures from array {P}, are uncommuted, excluding these one-dimensional routes from array {C} – "Topology of ICN", updating based on data from array {C} – "Topology of ICN" initial data in array {M} – "List of routes", one-dimensional routes are switched from list {M} into multidimensional routes for delivery of data streams to ICN.
EFFECT: high stability of network operation due to point and timely detection and blocking of elements with functional disorders.
1 cl, 10 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR PROTECTING INFORMATION-COMPUTER NETWORK AGAINST UNAUTHORIZED IMPACT | 2016 |
|
RU2635256C1 |
METHOD FOR PROTECTING INFORMATION-COMPUTER NETWORKS AGAINST CYBER ATTACKS | 2016 |
|
RU2622788C1 |
METHOD OF PROTECTING AN INFORMATION NETWORK FROM INTRUSIONS | 2019 |
|
RU2705773C1 |
METHOD OF PROTECTING INFORMATION COMPUTER NETWORKS FROM COMPUTER ATTACKS | 2011 |
|
RU2472211C1 |
METHOD TO PROTECT INFORMATION COMPUTER NETWORKS AGAINST COMPUTER ATTACKS | 2012 |
|
RU2483348C1 |
METHOD FOR PROTECTING COMPUTER NETWORKS FROM COMPUTER ATTACKS | 2005 |
|
RU2285287C1 |
METHOD FOR PROTECTION OF COMPUTER NETWORKS BASED ON LEGENDIZING | 2023 |
|
RU2814463C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2018 |
|
RU2680038C1 |
METHOD FOR PROTECTING COMPUTING NETWORKS FROM COMPUTER ATTACKS DIRECTED ON VARIOUS NODES AND INFORMATION RESOURCES | 2021 |
|
RU2782704C1 |
METHOD OF COMPUTER NETWORKS PROTECTION | 2017 |
|
RU2649789C1 |
Authors
Dates
2024-12-24—Published
2024-04-08—Filed