FIELD: information technology.
SUBSTANCE: method involves scanning a computer for presence of malicious applications while storing the scanning results in an inspection log; sending the inspection log for analysis; generating a heuristic scenario of detecting malicious applications based on analysis of the inspection log and sending the generated heuristic scenario of detecting malicious applications to the computer; performing procedures to optimise operation of the scenario during which malfunctions and/or unknown malicious applications are detected; making changes to the existing heuristic scenario of detecting malicious applications to correct the malfunctions and/or detect the unknown malicious applications; sending the changes for the existing heuristic scenario of detecting malicious applications.
EFFECT: high probability of detecting malicious applications.
12 cl, 3 dwg
Authors
Dates
2014-03-27—Published
2012-09-28—Filed