FIELD: information technology.
SUBSTANCE: invention relates to computer security. Method, which comprises analysing by means of a first security client objects in order to detect a malicious object; collecting by means of first security client object information during analysis; selecting by first security client a second client from at least two security clients to participate in interaction with first security client; wherein selection of second security client is carried out based on geographic mutual arrangement of security clients, communication channel capacity between security clients, query results, previously processed by other security clients; analysing by second security client an object in order to detect a malicious object; eliminating by means of first security client on a computing device malicious object by means of eliminating malicious object obtained from side of second client.
EFFECT: technical result is improved security of computing device.
2 cl, 6 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD FOR ELIMINATION OF CONSEQUENCES OF INFECTION OF VIRTUAL MACHINES | 2014 |
|
RU2583709C2 |
SYSTEM AND METHOD OF DETECTING THREAT IN CODE EXECUTED BY VIRTUAL MACHINE | 2012 |
|
RU2522019C1 |
SYSTEM AND METHOD OF DETECTING MALICIOUS ENTITIES DISTRIBUTED OVER PEER-TO-PEER NETWORKS | 2011 |
|
RU2487406C1 |
SYSTEM AND METHOD OF DETECTING FRAUDULENT ONLINE TRANSACTIONS | 2014 |
|
RU2571721C2 |
METHOD OF CONTROLLING APPLICATIONS | 2015 |
|
RU2587424C1 |
SYSTEM AND METHOD FOR OPTIMISING EXECUTION OF ANTIVIRUS TASKS IN LOCAL AREA NETWORK | 2010 |
|
RU2453917C1 |
SYSTEM AND METHOD OF DETECTING DIRECTED ATTACK ON CORPORATE INFRASTRUCTURE | 2013 |
|
RU2587426C2 |
METHOD OF USING DEDICATED COMPUTER SECURITY SERVICE | 2015 |
|
RU2601162C1 |
SYSTEM AND METHOD FOR ANALYSING FILE LAUNCH EVENTS FOR DETERMINING SAFETY RANKING THEREOF | 2012 |
|
RU2531565C2 |
METHOD FOR AUTOMATIC GENERATION OF HEURISTIC ALGORITHMS FOR SEARCHING FOR MALICIOUS OBJECTS | 2012 |
|
RU2510530C1 |
Authors
Dates
2016-11-20—Published
2015-03-31—Filed