FIELD: information technology.
SUBSTANCE: method of detecting malicious entities distributed over peer-to-peer networks consists of the following steps: requesting metadata relating to an unverified download entity from a control module at a peer-to-peer network server using a peer-to-peer network client of a user computer system. Further, the control module at the peer-to-peer network server determines availability of an antivirus module on the user computer system. Metadata relating to the unverified download entity are then downloaded using the peer-to-peer network client of the user computer system having an antivirus module. A download entity corresponding to the downloaded metadata is also obtained using said peer-to-peer network client of the user computer system. Malicious entities are also detected by checking the download entity using the antivirus module of said user computer system.
EFFECT: high level of security of a user computer system from malicious entities distributed over peer-to-peer networks.
15 cl, 6 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD OF PROTECTING CLOUD INFRASTRUCTURE FROM ILLEGAL USE | 2012 |
|
RU2536663C2 |
METHOD FOR AUTOMATIC GENERATION OF HEURISTIC ALGORITHMS FOR SEARCHING FOR MALICIOUS OBJECTS | 2012 |
|
RU2510530C1 |
SYSTEM AND METHOD FOR CHECKING WEB RESOURCES FOR PRESENCE OF MALICIOUS COMPONENTS | 2010 |
|
RU2446459C1 |
SYSTEM AND METHOD TO PROTECT COMPUTER SYSTEM AGAINST ACTIVITY OF HARMFUL OBJECTS | 2011 |
|
RU2468427C1 |
SYSTEM AND METHOD FOR AUTOMATIC INVESTIGATION OF SAFETY INCIDENTS | 2011 |
|
RU2481633C2 |
METHOD OF USING DEDICATED COMPUTER SECURITY SERVICE | 2015 |
|
RU2601162C1 |
METHOD OF GENERATING INFORMATION REQUEST ABOUT FILE DURING ANTIVIRUS CHECKING IN ORDER TO EXCLUDE FALSE OPERATION | 2018 |
|
RU2696236C1 |
SYSTEM AND METHOD OF CREATING RULES FOR FILTERING INSIGNIFICANT EVENTS FOR EVENT LOG ANALYSIS | 2012 |
|
RU2514139C1 |
METHOD AND APPARATUS FOR DETECTING VIRUSES IN FILE SYSTEM | 2010 |
|
RU2551820C2 |
METHOD FOR DISTRIBUTED PERFORMANCE OF COMPUTER SECURITY TASKS | 2011 |
|
RU2494453C2 |
Authors
Dates
2013-07-10—Published
2011-11-24—Filed