FIELD: physics.
SUBSTANCE: invention relates to computer engineering. Disclosed is a data compromise decision system which comprises: a) an imitation unit calculating means for calculating a simulcast in series for each selected message from a data log containing at least two messages, wherein the message authentication code calculation includes: (iii) for a first selected message: calculating the message authentication code based on the predetermined encryption key and the selected message; (iv) for each subsequent message after the first message: generating an encryption key based on the encryption key generated for the message selected previously; generating a data unit based on the selected message authentication code and the simulated value calculated for the message selected previously; message authentication code calculation based on generated encryption key and data unit; recording into the recording message authentication code base containing the last calculated simulated value and all selected messages; b) a verification decision means for: capturing an event which satisfies predetermined rules, wherein the event occurs when the message is recorded in the data log; making a decision on the need to perform data compromise verification based on the intercepted event and sending the selected record from the message base to the selected object; c) a verification means for analysing the record, wherein the analysis includes: computation of message authentication code sequentially for each message contained in the obtained record, which includes: (i) for the first message: calculating the message authentication code based on the predetermined encryption key and the selected message; (ii) for each subsequent message after the first message: generation of the encryption key based on the encryption key generated for the message previously selected, generating a data unit based on the selected message and the message authentication code value calculated for the message selected previously, calculating the message authentication code based on the generated encryption key and the data unit; comparison of calculated message authentication code with message authentication code contained in selected record; making a decision on data compromise if the calculated message authentication code does not coincide with the imitation data contained in the selected record.
EFFECT: technical result consists in determining data compromising due to analysis of differences between calculated simulated images based on said data.
8 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD AND SYSTEM FOR UNIDIRECTIONAL DATA TRANSMISSION BETWEEN COMPUTING DEVICES | 2023 |
|
RU2817533C1 |
METHOD OF CRYPTOGRAPHIC PROTECTION OF COMMUNICATION CHANNELS BETWEEN A GROUND CONTROL STATION AND SIMULTANEOUSLY SEVERAL UNMANNED AERIAL VEHICLES | 2020 |
|
RU2730368C1 |
SYSTEM AND METHOD OF DETECTION OF MALICIOUS FILES USING A TRAINED MALWARE DETECTION PATTERN | 2017 |
|
RU2654151C1 |
SYSTEM AND METHOD OF DETECTING A MALICIOUS FILE | 2018 |
|
RU2739865C2 |
SYSTEM AND METHOD OF CLASSIFYING OBJECTS OF COMPUTER SYSTEM | 2018 |
|
RU2724710C1 |
SYSTEM AND DETECTING METHOD OF REMOTE ADMINISTRATION APPLICATION | 2016 |
|
RU2634173C1 |
AUTHENTICATED CODING METHOD | 2018 |
|
RU2694336C1 |
SYSTEM AND METHOD OF MANAGING COMPUTING RESOURCES FOR DETECTING MALICIOUS FILES | 2017 |
|
RU2659737C1 |
SYSTEM AND METHOD OF MACHINE TRAINING MODEL OF DETECTING MALICIOUS FILES | 2017 |
|
RU2673708C1 |
SYSTEM AND METHOD OF BLOCKING SCRIPT EXECUTION | 2015 |
|
RU2606564C1 |
Authors
Dates
2019-08-21—Published
2018-02-06—Filed