FIELD: information technology.
SUBSTANCE: in the method of monitoring program execution using routing, databases of identifiers of computers and programs installed thereon are created. After replacing routing text lines in a program module with corresponding identifiers, the identifier of the computer and programs installed thereon is read. Intervals for generating routing files for each computer are calculated. The routing files for executing the j-th program are transferred from the i-th computer to a control unit. The identifier of the computer and programs installed thereon is stored during program integration. A database of reference routing files for each j-th program executed on the i-th computer is created. Routing files are generated through defined time intervals. The routing files for executing the j-th program are transferred from the i-th computer to a control module. The obtained routing files are compared with reference values. If the routing file mismatch, an attack detection signal is transmitted to an automated system.
EFFECT: high reliability of generating routing files and high security of automated system.
2 cl, 2 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD OF CONTROL OVER PROGRAMS EXECUTION WITH HELP OF BINARY APPLICATIONS TRACING | 2008 |
|
RU2385485C1 |
METHOD AND APPARATUS FOR CONTROLLING DISTRIBUTED INFORMATION SYSTEM DATA STREAMS | 2013 |
|
RU2547628C2 |
METHOD FOR PRODUCTION AND MAINTENANCE OF INDIVIDUAL SOFTWARE PRODUCT ESC-M TECHNOLOGY | 2002 |
|
RU2195016C2 |
METHOD OF MANAGING WEB SITE DATA | 2018 |
|
RU2691834C1 |
AUTOMATED SAFETY ASSESSMENT OF BUSINESS-CRITICAL COMPUTER SYSTEMS AND RESOURCES | 2011 |
|
RU2657170C2 |
METHOD AND SYSTEM FOR GENERATING THE LIST OF COMPROMISE INDICATORS | 2020 |
|
RU2743619C1 |
SYSTEM AND METHOD FOR DETECTING PHISHING WEB PAGES | 2016 |
|
RU2637477C1 |
METHOD AND APPARATUS FOR CONTROLLING DATA STREAMS OF A DISTRIBUTED INFORMATION SYSTEM USING IDENTIFIERS | 2019 |
|
RU2710284C1 |
METHOD AND SYSTEM FOR IDENTIFYING EXPLOITED VULNERABILITIES IN THE PROGRAM CODE | 2022 |
|
RU2790005C1 |
METHOD AND SYSTEM OF PROTOCOLS ANALYSIS OF HARMFUL PROGRAMS INTERACTION WITH CONTROL CENTERS AND DETECTION OF COMPUTER ATTACKS | 2016 |
|
RU2634211C1 |
Authors
Dates
2012-08-20—Published
2011-07-19—Filed