FIELD: information technology.
SUBSTANCE: system contains a collecting tool for selecting a script from network resource; a tool for generating an intermediate code for script; a tool for computing hash sums from the intermediate code; a hash sum database for storing group that includes hash sums, group compactness and group trust coefficients; a group search tool in which hash sum is similar to the computed hash sum; a database of verdict templates, including group index, the trust coefficient of verdict template; a statistics collector for calculating group index of selected group based on group compactness and group trust coefficients, and the similarity of hash sums; an analysis tool for selecting verdict template, in which group index is similar to the group index determined by the statistics collector and the computed degree of similarity of these group indexes; tool for verdict rentering on whether script is phishing, based on matching of trust coefficient of verdict template and received degree of similarity of group indexes to the set phishing threshold value.
EFFECT: detection of phishing scripts.
22 cl, 6 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD OF BLOCKING SCRIPT EXECUTION | 2015 |
|
RU2606564C1 |
SYSTEM AND METHOD OF CLASSIFYING OBJECTS OF COMPUTER SYSTEM | 2018 |
|
RU2724710C1 |
SYSTEM AND METHOD OF CLASSIFICATION OF OBJECTS | 2017 |
|
RU2679785C1 |
SYSTEM AND METHOD OF MACHINE TRAINING MODEL OF DETECTING MALICIOUS FILES | 2017 |
|
RU2673708C1 |
SYSTEM AND METHOD OF DETECTION OF MALICIOUS FILES USING A TRAINED MALWARE DETECTION PATTERN | 2017 |
|
RU2654151C1 |
SYSTEM AND METHOD OF DETECTING A MALICIOUS FILE | 2018 |
|
RU2739865C2 |
SYSTEM AND METHOD OF DETECTING MALICIOUS FILES ACCOMPANIED WITH USING THE STATIC ANALYSIS ELEMENTS | 2017 |
|
RU2654146C1 |
SYSTEM AND METHOD OF MANAGING COMPUTING RESOURCES FOR DETECTING MALICIOUS FILES | 2017 |
|
RU2659737C1 |
SYSTEM AND METHOD OF GENERATING RULES FOR SEARCHING DATA USED FOR PHISHING | 2014 |
|
RU2580027C1 |
METHOD OF MALICIOUS FILES DETECTING, EXECUTED BY MEANS OF THE STACK-BASED VIRTUAL MACHINE | 2015 |
|
RU2624552C2 |
Authors
Dates
2017-06-16—Published
2015-09-30—Filed