AUTOMATED SAFETY ASSESSMENT OF BUSINESS-CRITICAL COMPUTER SYSTEMS AND RESOURCES Russian patent published in 2018 - IPC H04L29/06 G06F21/57 

Abstract RU 2657170 C2

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to security of computer systems. Method of assessment of target computing environment security configuration include: a) scanning of identified IP-addresses and ports; b) dactyloscopic recording from detected open ports to detect services that were through; c) "fingerprinting" - determination of activity of said target environment; d) appealing to modules base and performing at least one of these modules which are designed to find vulnerabilities in the security system, available through IP-address and ports; in this case, at least one said module is executed based on its configuration; said target computer environment is used for business-critical applications execution, wherein at least one of said modules performs a method comprising: cc-1) recipients table search for remote function calls and other interfaces for application services associated with said targeted environment; cc-2) search of journal files with applications for said targeted environment; cc-3) determining of connections between different systems related to said targeted environment based on found recipients tables and journal files; cc-4) graphic display of determined connections; cc-5) provision of formed grafic display of determined connections to a user.

EFFECT: invention provides effective computer systems security.

9 cl, 4 dwg

Similar patents RU2657170C2

Title Year Author Number
SYSTEM AND METHOD FOR OUTSIDE CONTROL OF THE CYBERATTACK SURFACE 2021
  • Bobak Tim Dzhon Oskar
  • Volkov Dmitrij Aleksandrovich
RU2778635C1
SYSTEM AND METHOD FOR DEPLOYING PRECONFIGURED SOFTWARE 2012
  • Voronkov Konstantin Pavlovich
  • Deshevykh Stepan Nikolaevich
  • Jablokov Viktor Vladimirovich
RU2541935C2
SEARCH FOR SECURITY PROBLEMS IN SOFTWARE AND OPERATING SYSTEMS IN PUBLIC CLOUDS 2023
  • Zahryapin Mihail Sergeevich
  • Elagin Aleksej Nikolaevich
RU2825724C1
METHOD FOR CREATING AND APPLYING AN APPLICATION INTERACTION RULE ON AN IOT DEVICE 2021
  • Tikhomirov Anton Vladimirovich
  • Tatarinov Ivan Ivanovich
  • Konoplev Sergei Valerevich
RU2757651C1
MULTI-TUNNEL ADAPTER OF VIRTUAL COMPUTER NETWORK 2015
  • Glazemakers, Kurt
  • Allansson, Per Johan
RU2675147C1
METHOD FOR USING A MODEL OF THE IoT APPARATUS TO DETECT ANOMALIES IN THE OPERATION OF THE APPARATUS 2021
  • Tikhomirov Anton Vladimirovich
  • Tatarinov Ivan Ivanovich
  • Konoplev Sergei Valerevich
RU2772072C1
METHOD FOR APPLYING PERSONAL DATA PROCESSING POLICIES FOR AN IoT DEVICE 2021
  • Tikhomirov Anton Vladimirovich
  • Tatarinov Ivan Ivanovich
  • Konoplev Sergei Valerevich
RU2767714C1
SYSTEM AND METHOD FOR TARGET INSTALLATION OF CONFIGURED SOFTWARE 2012
  • Voronkov Konstantin Pavlovich
  • Deshevykh Stepan Nikolaevich
  • Jablokov Viktor Vladimirovich
RU2523113C1
METHOD FOR CONFIGURATION OF IoT APPARATUSES DEPENDING ON THE TYPE OF NETWORK 2021
  • Tikhomirov Anton Vladimirovich
  • Tatarinov Ivan Ivanovich
  • Konoplev Sergei Valerevich
RU2760625C1
METHOD FOR CONTROLLING AN IoT APPARATUS FROM THE SIDE OF AN ELEMENT OF THE NETWORK INFRASTRUCTURE 2021
  • Tikhomirov Anton Vladimirovich
  • Tatarinov Ivan Ivanovich
  • Konoplev Sergei Valerevich
RU2769632C1

RU 2 657 170 C2

Authors

Nunez Di Srose Mariano

Dates

2018-06-08Published

2011-07-01Filed