首页> 外国专利> SYSTEM AND METHOD OF DETECTING DIRECTED ATTACK ON CORPORATE INFRASTRUCTURE

SYSTEM AND METHOD OF DETECTING DIRECTED ATTACK ON CORPORATE INFRASTRUCTURE

机译:检测企业基础设施直接攻击的系统和方法

摘要

FIELD: information technology.;SUBSTANCE: invention relates to protection against computer threats. Method of detecting harmful objects on a computing device comprises the following steps: a) obtaining of information on at least one object on the computing device containing, among them, a checksum of the object by means of a device for detection of suspicious objects; b) analysis of the said information on the object by means of a device for detection of suspicious objects, at that, based on a set of heuristic rules used by the device for detection of suspicious objects, one determines if the analysed object is suspicious or not; c) collection, by means of device for detection of suspicious objects, of information on the object, if it was classified as suspicious at the earlier stage, while the said information includes at least an API-function call history log, time of appearance of the object on the computing device, and transmission of the collected information on the suspicious object to a device for objects analysis; d) performance of analysis of the received from the device for detection of suspicious objects information on the object by the device for objects analysis; at that, based on a set of heuristic rules used by the device for objects analysis, done determines whether the suspicious object is potentially harmful or not, and sends a request for transmission of the potentially harmful object; at that, recognition of the suspicious object as potentially harmful in accordance with heuristic rules is carried out by comparing information on the analysed object and information on objects stored in a database of harmful objects and a database of safe objects; at that, the set of heuristic rules used for the said analysis differs from the set of heuristic rules used by the device for detection of suspicious objects; e) reception of a request from the device for objects analysis for transmission of a potentially harmful object by means of the device for detection of suspicious objects; f) determination, with the help of the device for complying with safety policy, of a possibility for transmission of the potentially harmful object to the device for objects analysis; at that, if transmission the potentially harmful object is prohibited in accordance with the security policy used by the device for complying with security policy, the latter inhibits transmission of the potentially harmful object to the device for objects analysis, otherwise the transmission is allowed; g) transmission, with the help of the device for detection of suspicious objects of the potentially harmful object for analysis to the device of objects analysis, if transmission was permitted by the device for complying with security policies at the earlier stage; h) analysis of received potentially harmful object by means of the device for objects analysis, at that, one clarifies, whether the degree of similarity of the potentially harmful object with any object from a database of harmful objects exceeds the preset threshold, and if the degree of similarity of the potentially harmful object with any object from a database of harmful objects exceeds the preset threshold, the said object is recognised as harmful.;EFFECT: higher safety of a computing device.;2 cl, 3 dwg
机译:技术领域:信息技术。发明领域:本发明涉及针对计算机威胁的防护。在计算设备上检测有害对象的方法包括以下步骤:a)通过用于检测可疑对象的设备获得关于计算设备上至少一个对象的信息,其中至少包含一个对象的校验和; b)借助于用于检测可疑对象的设备对关于所述对象的所述信息进行分析,在此,基于用于检测可疑对象的设备所使用的一组启发式规则,一个人确定所分析的对象是否可疑或不; c)如果在较早的阶段被分类为可疑,则通过用于检测可疑对象的设备收集有关该对象的信息,而该信息至少包括一个API函数调用历史记录,计算设备上的对象,并将收集到的有关可疑对象的信息传输到设备进行对象分析; d)由用于对象分析的设备对从检测到的用于检测对象的可疑对象信息的设备接收到的信息进行分析;在此,基于设备用于对象分析的一组启发式规则,完成确定可疑对象是否潜在有害,并发送传输潜在有害对象的请求;在此,通过比较关于分析对象的信息和关于存储在有害对象数据库和安全对象数据库中的对象的信息,根据启发式规则将可疑对象识别为潜在有害;在那一点上,用于所述分析的启发式规则的集合不同于用于检测可疑对象的设备使用的启发式规则的集合; e)接收来自设备的用于物体分析的请求,以通过用于检测可疑物体的设备传输潜在有害的物体; f)在符合安全政策的设备的帮助下确定将潜在有害物体传输到用于物体分析的设备的可能性;在这种情况下,如果根据设备用于遵守安全策略的安全策略禁止传输潜在有害对象,则后者禁止将潜在有害对象传输到用于对象分析的设备,否则允许传输; g)如果在较早阶段为了遵守安全策略而允许设备进行传输,则借助于用于检测潜在有害对象的可疑对象的分析设备进行传输。 h)通过物体分析装置对接收到的潜在有害物体进行分析,从而澄清了潜在有害物体与有害物体数据库中任何物体的相似度是否超过预设阈值,以及潜在有害对象与有害对象数据库中任何对象的相似度超过预设阈值,则将该对象识别为有害对象;效果:计算设备的更高安全性; 2 cl,3 dwg

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号