FIELD: information technology.
SUBSTANCE: method includes: obtaining information about the behavior of terminal when accessing during a given sliding time window; qualifying the behavior when accessing during the sliding time window in accordance with the behavior when accessing during the sliding time window, comprising: obtaining a time interval between two adjacent behavior cases when accessing for every two adjacent behavior cases during the sliding time window; and calculating the variance in time of behavior cases when accessing, based on the received time intervals; determine whether the behavior of terminal when accessing is malicious in accordance with the results of qualification.
EFFECT: increasing efficiency and accuracy in identifying malicious user behavior.
7 cl, 9 dwg
| Title | Year | Author | Number | 
|---|---|---|---|
| PERMISSION MANAGEMENT METHOD, DEVICE AND SYSTEM | 2014 |  | RU2612587C2 | 
| METHOD AND DEVICE FOR THE SEARCH RESULTS OBTAINING | 2015 | 
 | RU2653297C2 | 
| CONSTANT TRAINING FOR INTRUSION DETECTION | 2018 | 
 | RU2758041C2 | 
| INFORMATION PUSHING METHOD AND DEVICE | 2015 | 
 | RU2656574C2 | 
| METHOD AND A COMPUTING DEVICE FOR DETECTING SUSPICIOUS USERS IN MESSAGING SYSTEMS | 2018 | 
 | RU2708508C1 | 
| METHOD AND DEVICE FOR SENDING MESSAGES | 2015 | 
 | RU2638762C2 | 
| METHOD AND DEVICE FOR INFORMATION PROCESSING | 2015 | 
 | RU2660830C9 | 
| SYSTEMS AND METHODS FOR TRANSPORT COMMUNICATION SERVICES CONTROLLED BY THE QUALITY OF INTERACTION | 2019 | 
 | RU2796235C2 | 
| METHOD AND DEVICE TO ACTIVATE THE WORKING CONDITION OF THE MOBILE TERMINAL | 2015 | 
 | RU2628484C2 | 
| COMPLEX CLASSIFICATION FOR DETECTING MALWARE | 2014 | 
 | RU2645268C2 | 
Authors
Dates
2017-08-15—Published
2015-04-30—Filed