The method multilevel proactiv information systems security initiative with detection of computer attacks in computer networks is considered at occurrence of infringements of external perimeter of system of protection of the information. The given method allows to raise efficiency of detection of computer attack at the expense of use of trace of routes of transfer of packages.
cyberspace, protection of an information network, computer attacks, trace of a route, IP protocol, multilevel proactive protection of information, system attacks
1. Moldovyan N.A., Moldovyan A.A., Eremeev M.A. Kriptografiya: ot primitiva k sintezu algoritmov. SPb.: BVH-Peterburg, 2004. S. 301-337.
2. Patent RU № 2152691, MPK G06F 12/14, opubl. 10.07.2000 g. // Patenty Rossii. URL: http://ru-patent.info/21/50-54/2152691.html (data obrascheniya: 24.03.2014).
3. Patent RU № 2163727, MPK G06F 13/00, F 12/14, opubl. 27.02.2001 g. // Patenty Rossii. URL:http://ru-patent.info/21/60-64/2163727.html (data obrascheniya: 24.03.2014).
4. Patent RU № 2285287, MPK G06F 12/14, 9/00, opubl. 10.10.2006 g. // FIPS. Byul. № 28.
5. Patent RU № 2182355, MPK G06F 12/14, 9/00, opubl. 10.05.2002 g. // Patenty Rossii. URL: http://ru-patent.info/21/80-84/2182355.html (data obrascheniya: 24.03.2014).
6. Patent RU № 2306599, MPK G06F 21/00, 2006.01, po p.1, opubl. 20.09.2007 g. // FIPS. Byul. № 26.
7. Setevaya bezopasnost'. Chelovek-po-seredine // Inform. server. URL: http://book.itep.ru/ 6/secur_6.htm (data obrascheniya: 10.02.2014).
8. GOST R ISO/MEK 20000-1-2010. Informacionnaya tehnologiya. Menedzhment uslug. Specifikaciya. M.: Standartinform, 2011. Ch. 1.
9. Olifer V.G., Olifer N.A. Komp'yuternye seti: principy, tehnologii, protokoly: ucheb. dlya vuzov. 3-e izd. SPb.: Piter, 2010. S. 340-349.
10. Zolotov S. Protokoly Internet. SPb.: BHV-Sankt-Peterburg, 1998. S. 182-190.
11. RFC 791. Internet Protocol. 1981. sent. S. 11-22.