FIELD: information technology.
SUBSTANCE: method includes: obtaining information about the behavior of terminal when accessing during a given sliding time window; qualifying the behavior when accessing during the sliding time window in accordance with the behavior when accessing during the sliding time window, comprising: obtaining a time interval between two adjacent behavior cases when accessing for every two adjacent behavior cases during the sliding time window; and calculating the variance in time of behavior cases when accessing, based on the received time intervals; determine whether the behavior of terminal when accessing is malicious in accordance with the results of qualification.
EFFECT: increasing efficiency and accuracy in identifying malicious user behavior.
7 cl, 9 dwg
Title | Year | Author | Number |
---|---|---|---|
PERMISSION MANAGEMENT METHOD, DEVICE AND SYSTEM | 2014 |
|
RU2612587C2 |
METHOD AND DEVICE FOR THE SEARCH RESULTS OBTAINING | 2015 |
|
RU2653297C2 |
CONSTANT TRAINING FOR INTRUSION DETECTION | 2018 |
|
RU2758041C2 |
INFORMATION PUSHING METHOD AND DEVICE | 2015 |
|
RU2656574C2 |
METHOD AND A COMPUTING DEVICE FOR DETECTING SUSPICIOUS USERS IN MESSAGING SYSTEMS | 2018 |
|
RU2708508C1 |
METHOD AND DEVICE FOR SENDING MESSAGES | 2015 |
|
RU2638762C2 |
METHOD AND DEVICE FOR INFORMATION PROCESSING | 2015 |
|
RU2660830C9 |
SYSTEMS AND METHODS FOR TRANSPORT COMMUNICATION SERVICES CONTROLLED BY THE QUALITY OF INTERACTION | 2019 |
|
RU2796235C2 |
METHOD AND DEVICE TO ACTIVATE THE WORKING CONDITION OF THE MOBILE TERMINAL | 2015 |
|
RU2628484C2 |
COMPLEX CLASSIFICATION FOR DETECTING MALWARE | 2014 |
|
RU2645268C2 |
Authors
Dates
2017-08-15—Published
2015-04-30—Filed