FIELD: protection of computer networks.
SUBSTANCE: successively reading a given number of time intervals between packets of network traffic in a protected subnetwork and calculating a point estimate of parameters of a delay time distribution function required to generate and direct false network traffic with dynamic properties close to real network traffic. When unauthorized information flows are detected, the lease of previously assigned network parameters of network devices in the initial subnetwork is completed. Network device is set in the source subnet to generate and direct false network traffic. New network parameters in the new subnet are generated and assigned to all network devices, except for the specified network device. False traffic is generated and directed through the generated time intervals. Upon expiration of the specified time, the distribution function parameter is reassessed. New network parameters are assigned to the specified network device in the new subnet.
EFFECT: high efficiency of protection by reducing the capabilities of an intruder to compromise protection means and mislead him/her.
1 cl, 4 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF PROTECTING COMPUTER NETWORKS | 2024 |
|
RU2831807C1 |
METHOD FOR PROTECTING COMPUTER NETWORKS | 2023 |
|
RU2805354C1 |
METHOD FOR PROTECTION OF COMPUTER NETWORKS | 2022 |
|
RU2789810C1 |
METHOD OF PROTECTING OF COMPUTER NETWORKS | 2019 |
|
RU2716220C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2019 |
|
RU2726900C1 |
METHOD FOR PROTECTING COMPUTER NETWORKS | 2023 |
|
RU2810193C1 |
METHOD FOR COMMUNICATION NETWORK STRUCTURE MASKING | 2023 |
|
RU2794532C1 |
METHOD FOR COMMUNICATION NETWORK STRUCTURE MASKING | 2022 |
|
RU2793104C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2686023C1 |
METHOD FOR DYNAMICALLY CONFIGURING A NETWORK EQUIPMENT PORT | 2002 |
|
RU2305906C2 |
Authors
Dates
2025-03-27—Published
2024-04-09—Filed