FIELD: information technology.
SUBSTANCE: invention relates to antivirus technologies. Control system for computing resources for the detection of malicious files is disclosed, which contains: a) a behavior log analysis tool for: generating at least one behavior pattern based on commands and parameters selected from the generated behavior log executed on the computing device (hereinafter referred to as applications), wherein the behavior pattern is a set of at least one instruction and such parameter that describes all the commands from the set; calculation of convolution from the generated behavior pattern; transfer of the calculated convolution to the means for calculating the severity level; b) a means of calculating the severity of the severity, designed to: calculate the severity of applications based on the analysis of the resulting convolution using the malware detection model, while the severity of applications is a numerical value that characterizes the probability that by the time of calculating the said severity of malicious applications, malicious activity occurs; transfer of the computed severity of applications to the resource management tool; c) a resource management tool for managing the computing resources that are used to ensure the security of said computing device (hereinafter, resources), depending on the degree of severity of the application received, so that the severity of the applications computed after the said resource management is in a predetermined range of values, and in the event that the received severity of the application severity exceeds the predetermined threshold value of the request for allocation of additional resources of the computing device, in the case of a reduction in the severity level obtained, below a predetermined threshold value for transmitting a request to release previously allocated resources of the computing device.
EFFECT: management of computing resources for detection of malicious files.
24 cl, 7 dwg, 1 tbl
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD OF DETECTION OF MALICIOUS FILES USING A TRAINED MALWARE DETECTION PATTERN | 2017 |
|
RU2654151C1 |
SYSTEM AND METHOD OF MACHINE TRAINING MODEL OF DETECTING MALICIOUS FILES | 2017 |
|
RU2673708C1 |
SYSTEM AND METHOD OF DETECTING A MALICIOUS FILE | 2018 |
|
RU2739865C2 |
SYSTEM AND METHOD OF CLASSIFYING OBJECTS OF COMPUTER SYSTEM | 2018 |
|
RU2724710C1 |
SYSTEM AND METHOD OF CLASSIFICATION OF OBJECTS | 2017 |
|
RU2679785C1 |
SYSTEM AND METHOD OF SELECTING MEANS OF DETECTING MALICIOUS FILES | 2019 |
|
RU2739830C1 |
SYSTEM AND METHOD FOR TRAINING HARMFUL CONTAINER DETECTION MODEL | 2018 |
|
RU2697955C2 |
METHOD OF DETECTING MALICIOUS FILES THAT COUNTERACT ANALYSIS IN ISOLATED ENVIRONMENT | 2018 |
|
RU2708355C1 |
SYSTEM AND METHOD OF DEFERRED AUTHORIZATION OF A USER ON A COMPUTING DEVICE | 2019 |
|
RU2716735C1 |
SYSTEM AND METHOD OF FILE ANALYSIS FOR MALICIOUSNESS IN VIRTUAL MACHINE | 2017 |
|
RU2665911C2 |
Authors
Dates
2018-07-03—Published
2017-08-10—Filed