PROTECTION FROM EXPLOITATION OF SOFTWARE VULNERABILITY Russian patent published in 2011 - IPC G06F21/22 

Abstract RU 2417429 C2

FIELD: information technology.

SUBSTANCE: in a target computer in a network computing environment, the method of minimising exploitation of software vulnerability by an intruder, where the software is installed on the target computer, by studying network traffic and identifying malicious code before it can be executed and/or installed. On the transport layer (for example, transmission control protocol (TCP) socket layer) network traffic can be viewed using a security component installed on the target computer. Upon reception of a message meant for the computer system, data included in the message are compared with exploit features used to identify the malicious code. Exploit features are provided for the security component by a security service which gathers information on the malicious code. Based on comparison of data in the message and exploit features, rules are identified, which instruct the security component to perform corresponding actions on the received message.

EFFECT: narrowing the risk window for computers which are potential targets of intruders.

19 cl, 2 dwg

Similar patents RU2417429C2

Title Year Author Number
METHOD FOR DETECTING MALICIOUS SOFTWARE AND ELEMENTS 2015
RU2613535C1
METHOD FOR DETECTING MALWARE AND MALWARE COMPONENTS 2021
  • Pavlikov Sergej Nikolaevich
  • Kolomeets Valeriya Yurevna
  • Kopaeva Ekaterina Yurevna
  • Plennik Milena Denisovna
  • Zimareva Evgeniya Andreevna
  • Kolesov Yurij Yurevich
  • Gareeva Marina Anatolevna
  • Tsepeleva Alena Sergeevna
RU2762079C1
METHOD FOR ELIMINATING VULNERABILITIES OF DEVICES HAVING ACCESS TO INTERNET 2016
  • Rusakov Vyacheslav Evgenevich
  • Yanus Marta
RU2636700C1
AUTOMATED SAFETY ASSESSMENT OF BUSINESS-CRITICAL COMPUTER SYSTEMS AND RESOURCES 2011
  • Nunez Di Srose Mariano
RU2657170C2
SYSTEM AND METHOD FOR OUTSIDE CONTROL OF THE CYBERATTACK SURFACE 2021
  • Bobak Tim Dzhon Oskar
  • Volkov Dmitrij Aleksandrovich
RU2778635C1
REMEDIAL METHOD FOR ROUTER VULNERABILITIES 2016
  • Rusakov Vyacheslav Evgenevich
  • Yanus Marta
RU2614559C1
AUTOMATIC DETECTION AND RESPONSE TO VULNERABILITIES 2007
  • Rodzhers Dzhastin
  • Lorens Ehrik M.
  • Bridzh Genri F.
RU2462754C2
SYSTEM AND METHOD FOR CHECKING WEB RESOURCES FOR PRESENCE OF MALICIOUS COMPONENTS 2010
  • Zajtsev Oleg Vladimirovich
  • Denisov Vitalij Igorevich
RU2446459C1
SYSTEM AND METHOD FOR FORMING A SYSTEM OF TRAP RESOURCES 2021
  • Shmelev Iaroslav Aleksandrovich
  • Demeter Dan
  • Preuss Marko
  • Kuzin Mikhail Iurevich
RU2761542C1
COMPUTER APPARATUS FOR DETECTING AN UNWANTED CALL 2021
  • Demidov Aleksandr Andreevich
  • Firstov Aleksandr Borisovich
  • Chistiakov Denis Evgenevich
  • Sabitov Ruslan Ramilevich
  • Golovanov Sergei Iurevich
  • Aliushin Viktor Mikhailovich
  • Roskov Vladislav Iurevich
  • Riadovskii Igor Anatolevich
RU2780046C1

RU 2 417 429 C2

Authors

Tompson Rodzher Dzhon

Mosher Gregori Ehndrju

Dates

2011-04-27Published

2007-03-26Filed