FIELD: calculating; counting.
SUBSTANCE: invention relates to computer engineering. Method comprises steps of: setting browser extension to browser; performing at least one predefined action simulating user operation; monitoring, by means of a recording means, an activity event occurring during execution of at least one predetermined action; recording events which have been associated with changes in the protected environment; analysing events from a list of events for events indicating changes specific to latent behaviour, where changes specific to concealed behaviour indicate browser expansion actions that were not previously declared in the analysed browser extension; obtained results are saved when at least one detected event is detected.
EFFECT: technical result is detection of latent behaviour in browser extension.
11 cl, 6 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD FOR EVALUATING MALICIOUS WEBSITES | 2015 |
|
RU2622870C2 |
SYSTEM AND METHOD OF DETECTING FRAUDULENT ONLINE TRANSACTIONS | 2014 |
|
RU2571721C2 |
SYSTEM AND METHOD OF PROVIDING SAFETY OF ONLINE TRANSACTIONS | 2013 |
|
RU2587423C2 |
SYSTEM AND METHOD OF DETERMINING MODIFIED WEB PAGES | 2015 |
|
RU2610254C2 |
SYSTEM AND METHOD OF ADAPTIVE CONTROL AND MONITORING OF USER ACTIONS BASED ON USER BEHAVIOUR | 2012 |
|
RU2534935C2 |
METHOD AND COMPUTING DEVICE FOR DETECTING TARGET MALICIOUS WEB RESOURCE | 2022 |
|
RU2791824C1 |
METHOD OF DETECTING MALICIOUS FILES THAT COUNTERACT ANALYSIS IN ISOLATED ENVIRONMENT | 2018 |
|
RU2708355C1 |
METHOD FOR PROCESSING INFORMATION SECURITY EVENTS PRIOR TO TRANSMISSION FOR ANALYSIS | 2020 |
|
RU2762528C1 |
METHOD FOR ADJUSTING THE PARAMETERS OF A MACHINE LEARNING MODEL IN ORDER TO IDENTIFY FALSE TRIGGERING AND INFORMATION SECURITY INCIDENTS | 2020 |
|
RU2763115C1 |
METHOD FOR DETECTING MALICIOUS SOFTWARE AND ELEMENTS | 2015 |
|
RU2613535C1 |
Authors
Dates
2019-08-21—Published
2018-02-06—Filed