http://rdf.ncbi.nlm.nih.gov/pubchem/patent/RU-2726900-C1
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_e63d779ddf1a0a8a03a134c90c6b1580 |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-554 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-55 |
filingDate | 2019-12-09-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
grantDate | 2020-07-16-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_ca2d39aefd8e6f2ee7f28daef99713d7 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_be2d523074d96cebf19fae4e180fcfc3 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_15c91e482a9638eb343056732252bf9d http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_88116772980c3819ce596642da3d0bc2 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b565abbe90441998f0b8240439565a6d http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_1aa7f1e7804a4f2e488c44bb532d010e |
publicationDate | 2020-07-16-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | RU-2726900-C1 |
titleOfInvention | Method of protecting computer networks |
abstract | FIELD: communication. n SUBSTANCE: invention relates to telecommunication and can be used in systems for detecting attacks in order to quickly identify and counter unauthorized actions in computer networks, in particular, in a "Internet" type data transmission network based on a TCP/IP (Transmission Control Protocol/Internet Protocol) communication protocol family. Result is achieved by changing IP addresses and ports of interaction of network devices of the protected computer network within the specified range of subnets without disrupting critical connections, through randomly selected intervals of time, adaptively adaptable depending on conditions of operation of computer network and actions of intruder, as well as due to absence of unreasonable changes of structural-functional characteristics of components of computer networks caused by false triggering. n EFFECT: technical result is wider field of use and high efficiency of protection, as well as reduced power consumption of protection. n 7 cl, 9 dwg |
isCitedBy | http://rdf.ncbi.nlm.nih.gov/pubchem/patent/RU-213782-U1 |
priorityDate | 2019-12-09-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Total number of triples: 24.