FIELD: physics.
SUBSTANCE: invention relates to computer engineering. Set goal is achieved by the fact that the incoming traffic is redirected from the illegitimate user to the dedicated server in the demilitarized zone of the data processing network, then the network address of the intruder is analysed for distribution of malicious requests in the network by checking it through a service for analysing suspicious files and links, and also through the geolocation service the geographic location of the intruder is determined, after which, based on the obtained information, the network address of the intruder is blocked.
EFFECT: high structural reliability of an information computer network.
1 cl, 15 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF PROTECTING AN INFORMATION NETWORK FROM INTRUSIONS | 2019 |
|
RU2705773C1 |
METHOD FOR PROTECTING INFORMATION-COMPUTER NETWORK AGAINST UNAUTHORIZED IMPACT | 2016 |
|
RU2635256C1 |
ROBUST AND SECURE HARDWARE-COMPUTER SYSTEM IN CLOUD COMPUTING ENVIRONMENT | 2013 |
|
RU2557476C2 |
METHOD FOR PROTECTING INFORMATION AND TELECOMMUNICATION NETWORK FROM PASSIVE COMPUTER ATTACKS | 2016 |
|
RU2642403C1 |
METHOD FOR MASKING STRUCTURE OF TELECOMMUNICATION NETWORK | 2016 |
|
RU2645292C2 |
METHOD OF PROTECTING INFORMATION-COMPUTER NETWORK FROM UNAUTHORIZED ACTIONS | 2024 |
|
RU2832438C1 |
METHOD TO PROVIDE INFORMATION SECURITY DURING USER ACCESS TO EXTERNAL INFORMATION RESOURCES VIA INTERNET | 2011 |
|
RU2445692C1 |
COMMUNICATION NETWORK STRUCTURE MASKING METHOD | 2018 |
|
RU2682105C1 |
METHOD OF DETECTION OF COMPUTER ATTACKS IN INFORMATION AND TELECOMMUNICATION NETWORK | 2013 |
|
RU2531878C1 |
METHOD FOR CONTROL OF DISTRIBUTED INFORMATION SYSTEM DATA STREAMS IN DDoS ATTACKS | 2018 |
|
RU2684575C1 |
Authors
Dates
2025-05-06—Published
2024-02-27—Filed