首页> 外国专利> SYSTEM AND METHOD FOR DETECTING DIRECTED ATTACKS TO CORPORATE INFRASTRUCTURE

SYSTEM AND METHOD FOR DETECTING DIRECTED ATTACKS TO CORPORATE INFRASTRUCTURE

机译:用于检测企业基础设施直接攻击的系统和方法

摘要

1. A method for detecting malicious objects on a computing device, in which: a) receive information about at least one object, including the checksum of the object using a means of detecting suspicious objects; b) analyze the information about the object using the means detection of suspicious objects, recognize the analyzed object as suspicious in accordance with the set of heuristic rules used by the means of detecting suspicious objects, and transmit information about the said object to and analysis to the object analysis tool; c) they analyze the received information about the object using the object analysis tool, recognize the suspicious object as potentially harmful in accordance with the set of heuristic rules used by the object analysis tool; d) transmit a potentially harmful object for analysis by the object analysis tool, when using a means of detecting suspicious objects based on the results of the analysis of information about the object produced by the facility analysis tool; e) analyze the gender identified potentially malicious object using the facility analysis tool and recognize the said object as malicious if it looks like an object from the database of malicious objects. 2. The method according to claim 1, wherein, using the object analysis means, based on the analysis of the object and the recognition of this object as malicious, the heuristic rules used by the means for detecting suspicious objects and the rules for eliminating the consequences of the presence of the specified malicious object are generated. The way
机译:1.一种用于在计算设备上检测恶意对象的方法,其中:a)使用检测可疑对象的手段来接收关于至少一个对象的信息,包括所述对象的校验和;以及b)使用可疑对象检测手段分析有关对象的信息,根据检测可疑对象手段所使用的启发式规则集,将分析对象识别为可疑对象,并将有关该对象的信息传递给并进行分析对象分析工具; c)他们使用对象分析工具分析接收到的有关对象的信息,并根据对象分析工具使用的启发式规则将可疑对象识别为潜在有害; d)当使用一种基于设施分析工具产生的有关物体的信息的分析结果来检测可疑物体时,将可能有害的物体传送给物体分析工具进行分析; e)使用设施分析工具分析识别出的性别的潜在恶意对象,如果该对象看起来像来自恶意对象数据库的对象,则将其识别为恶意对象。 2.根据权利要求1所述的方法,其中,使用所述对象分析装置,基于对所述对象的分析和对该对象的恶意识别,检测所述可疑对象的装置所使用的启发式规则以及用于消除所述对象的规则。产生指定恶意对象的后果。方式

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号