FIELD: information technology.
SUBSTANCE: method is realised by analysing links between network nodes, plotting a graph of links between network nodes and automatic analysis of changes in links between nodes with detection and blocking of the address of intermediate nodes. Said result is achieved by using a system of computing means, services for determining the route of a schedule in a network, a WHOIS service for accessing registration information on the owner of the domain and IP address and then plotting a graph of dissemination of malware from the malicious site over data links. Intensity of use of a communication channel to access a trusted node is also estimated; an intermediate node used for illegal acts is detected and blocked.
EFFECT: blocking intermediate nodes of an intruder.
9 cl, 8 dwg, 3 tbl
Title | Year | Author | Number |
---|---|---|---|
METHOD OF ANALYSING MALICIOUS ACTIVITY ON INTERNET, DETECTING MALICIOUS NETWORK NODES AND NEIGHBOURING INTERMEDIATE NODES | 2012 |
|
RU2523114C2 |
METHOD FOR CLASSIFYING OBJECTS TO PREVENT SPREAD OF MALICIOUS ACTIVITY | 2023 |
|
RU2808385C1 |
SYSTEM AND METHOD FOR DETECTION OF TARGET ATTACKS | 2014 |
|
RU2601147C2 |
SYSTEM AND METHOD FOR OUTSIDE CONTROL OF THE CYBERATTACK SURFACE | 2021 |
|
RU2778635C1 |
METHOD AND SYSTEM FOR DETECTING THE INFRASTRUCTURE OF A MALICIOUS SOFTWARE OR A CYBERCRIMINAL | 2020 |
|
RU2722693C1 |
SYSTEM AND METHOD FOR VERIFYING PUBLIC KEY CERTIFICATE TO COUNTERACT "MAN-IN-MIDDLE" ATTACKS | 2012 |
|
RU2514138C1 |
METHOD OF SELECTING SAFE ROUTE IN COMMUNICATION NETWORK OF GENERAL USE | 2016 |
|
RU2640627C1 |
METHOD AND COMPUTING DEVICE FOR DETECTING TARGET MALICIOUS WEB RESOURCE | 2022 |
|
RU2791824C1 |
SYSTEM AND METHOD OF AUTOGENERATION OF DECISION RULES FOR INTRUSION DETECTION SYSTEMS WITH FEEDBACK | 2016 |
|
RU2634209C1 |
METHOD FOR PROCESSING NETWORK TRAFFIC DATAGRAMS TO HIDE CORRESPONDING PAIRS OF SUBSCRIBERS OF INFORMATION AND TELECOMMUNICATION SYSTEMS | 2020 |
|
RU2763261C1 |
Authors
Dates
2013-10-10—Published
2012-08-10—Filed