FIELD: information security.
SUBSTANCE: log is accessed to retrieve information on usage associated with at least a part of multiple electronic apparatuses, the information on usage is analysed to identify a subset of electronic apparatuses, the list of the accessed network resources is transmitted to each of the list of network resources from the message, and after the response is analysed, it is determined whether the network resource that generated the response message is associated with malicious activity.
EFFECT: increasing the security of a network by detecting and analysing malicious activity of a predetermined type in a cloud computing system and LANs of other types with physical electronic apparatuses or virtual machines connected thereto.
20 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
POLICY-CONTROLLED DELEGATION OF ACCOUNT DATA FOR SINGLE REGISTRATION IN NETWORK AND SECURED ACCESS TO NETWORK RESOURCES | 2007 |
|
RU2439692C2 |
SYSTEM AND METHOD FOR ACTIVE DETECTION OF MALICIOUS NETWORK RESOURCES | 2021 |
|
RU2769075C1 |
SYSTEM AND METHOD FOR SECURING IOT DEVICES BY INSTALLING SECURITY COMPONENTS | 2022 |
|
RU2798178C1 |
SYSTEM AND METHOD FOR OUTSIDE CONTROL OF THE CYBERATTACK SURFACE | 2021 |
|
RU2778635C1 |
METHODS AND SYSTEMS FOR VERIFYING TRANSACTIONS OF E-MONEY TRANSFER | 2014 |
|
RU2644514C2 |
SYSTEM AND METHOD FOR VIRTUALISATION OF MOBILE NETWORK FUNCTION | 2014 |
|
RU2643451C2 |
NETWORK GROUP NAME FOR VIRTUAL MACHINES | 2008 |
|
RU2461050C2 |
SYSTEM AND METHOD OF DELIVERING AUDIO-VISUAL CONTENT TO CLIENT DEVICE | 2013 |
|
RU2647654C2 |
METHOD FOR IDENTIFYING INCONSISTENT USE OF THE RESOURCES OF A USER COMPUTING APPARATUS | 2020 |
|
RU2757330C1 |
PORTABLE STORAGE DEVICES SYSTEMS AND METHODS | 2015 |
|
RU2700183C2 |
Authors
Dates
2021-07-23—Published
2019-12-25—Filed