FIELD: computer engineering.
SUBSTANCE: computer-implemented method for generating the list of indicators of compromise, wherein a malware carrier is obtained, intended for preparing for the launch and / or launch of at least one primary malware module, an attack roadmap is developed by detecting additional malware carriers and / or the principal malware module and the sequence of their execution is determined, stipulated by the execution algorithm of the obtained malware carrier. At least one attack roadmap is found in the database, which coincides with the developed roadmap with the preset level of accuracy; the lists of indicators of compromise are extracted from the database for each malware carrier and / or the primary malware module from at least one found attack roadmap. The complete list of indicators of compromise is generated based on the compiled lists of indicators of compromise and the records of combined lists of compromise indicators extracted from the database; the compiled lists of compromise indicators are saved for each detected malware carrier or the primary malware module, as well as the complete list of compromise indicators in the database.
EFFECT: ensured countermeasures against advanced attacks on the network infrastructure.
14 cl. 7 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD FOR OUTSIDE CONTROL OF THE CYBERATTACK SURFACE | 2021 |
|
RU2778635C1 |
METHOD FOR DETECTING UNAUTHORIZED AND FAKE Wi-Fi ACCESS POINTS | 2023 |
|
RU2810111C1 |
METHOD FOR IDENTIFYING INFORMATION SECURITY THREATS (OPTIONS) | 2023 |
|
RU2802539C1 |
METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED ACCESS TO CORPORATE NETWORK OBJECTS | 2022 |
|
RU2799117C1 |
METHOD AND SYSTEM FOR PREVENTING COMPROMISE OF NETWORK INFRASTRUCTURE OBJECTS IN FREEIPA DIRECTORY SERVICE | 2023 |
|
RU2826430C1 |
SYSTEM AND METHOD FOR ACTIVE DETECTION OF MALICIOUS NETWORK RESOURCES | 2021 |
|
RU2769075C1 |
INTELLIGENT CONTROL SYSTEM FOR CYBERTHREATS | 2019 |
|
RU2702269C1 |
SYSTEM AND METHOD OF DETECTING THE SIGNS OF COMPUTER ATTACKS | 2017 |
|
RU2661533C1 |
METHOD OF COMBINING LARGE LANGUAGE MODEL AND SECURITY AGENT | 2023 |
|
RU2825975C1 |
METHOD OF USING LARGE LANGUAGE MODELS WHEN RESPONDING TO INFORMATION SECURITY INCIDENTS | 2023 |
|
RU2825972C1 |
Authors
Dates
2021-02-20—Published
2020-08-06—Filed