FIELD: information technology.
SUBSTANCE: invention relates to use of patterns of dangerous program behavior with a high level of false detections. Method of selective use of the pattern of dangerous programs behavior on computer systems, through which a pattern of dangerous behavior of programs is launched in a first mode on various computer systems, at which an antivirus application detects threats corresponding to the pattern, but does not perform actions for their elimination, statistics of threat detection are accumulated within a specified period of time, for each computer system, for which the number of false threats detected does not exceed a specified threshold value, introduction into the pattern of dangerous program behavior of all falsely detected threats is implemented, corresponding to a particular computer system as exceptions and the pattern of dangerous program behavior is switched into a second mode, which detects threats corresponding to the pattern, and performs actions to eliminate them.
EFFECT: reducing the number of false threat detections when using a pattern of dangerous program behavior.
6 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD OF ADAPTING PATTERNS OF DANGEROUS PROGRAM BEHAVIOR TO USERS' COMPUTER SYSTEMS | 2017 |
|
RU2652448C1 |
METHOD FOR EXCLUDING PROCESSES OF ANTIVIRUS SCANNING ON THE BASIS OF DATA ON FILE | 2015 |
|
RU2595510C1 |
SYSTEM AND METHOD OF REDUCING LOAD ON OPERATING SYSTEM WHEN EXECUTING ANTIVIRUS APPLICATION | 2013 |
|
RU2571723C2 |
SYSTEM AND METHOD FOR IMPROVING QUALITY OF DETECTING MALICIOUS OBJECTS USING RULES AND PRIORITIES | 2012 |
|
RU2514140C1 |
METHOD OF DETECTING MALICIOUS FILES THAT COUNTERACT ANALYSIS IN ISOLATED ENVIRONMENT | 2018 |
|
RU2708355C1 |
SYSTEM AND METHOD OF PROTECTING COMPUTING DEVICE FROM MALICIOUS OBJECTS USING COMPLEX INFECTION SCHEMES | 2011 |
|
RU2454705C1 |
SYSTEM AND METHOD FOR ANALYSING FILE LAUNCH EVENTS FOR DETERMINING SAFETY RANKING THEREOF | 2012 |
|
RU2531565C2 |
SYSTEM AND METHOD OF PROTECTING CLOUD INFRASTRUCTURE FROM ILLEGAL USE | 2012 |
|
RU2536663C2 |
METHOD FOR AUTOMATIC ADJUSTMENT OF SECURITY MEANS | 2012 |
|
RU2514137C1 |
METHOD OF CREATING SCRIPT OF POPULAR ACTIVATION EVENTS | 2015 |
|
RU2679783C2 |
Authors
Dates
2018-09-04—Published
2017-08-10—Filed