FIELD: information security.
SUBSTANCE: technical result is achieved by confirming the presence of malicious code in the executed file similar in the metadata to a trusted file.
EFFECT: ensured protection of information security.
8 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR DETECTING HARMFUL ASSEMBLIES | 2015 |
|
RU2628920C2 |
METHOD FOR ANTI-VIRUS SCANNING OF COMPUTER SYSTEM | 2015 |
|
RU2617925C2 |
MACHINE CODE ACCESS LIMITATION METHOD TO THE OPERATING SYSTEM RESOURCES | 2016 |
|
RU2625052C1 |
METHOD OF CATEGORIZING ASSEMBLIES AND DEPENDENT IMAGES | 2015 |
|
RU2635271C2 |
ARTIFICIAL INTELLIGENCE BASED COMPUTER SECURITY SYSTEM | 2017 |
|
RU2750554C2 |
SYSTEM AND METHOD OF DETECTING THE HARMFUL CIL-FILE | 2017 |
|
RU2660643C1 |
METHOD FOR AUTOMATIC ADJUSTMENT OF SECURITY MEANS | 2012 |
|
RU2514137C1 |
METHOD OF DETECTING MALICIOUS FILES USING LINK GRAPH | 2023 |
|
RU2823749C1 |
SYSTEM AND METHOD OF CREATING RULES FOR FILTERING INSIGNIFICANT EVENTS FOR EVENT LOG ANALYSIS | 2012 |
|
RU2514139C1 |
METHOD AND SYSTEM FOR DETECTING MALICIOUS FILES IN A NON-ISOLATED MEDIUM | 2020 |
|
RU2722692C1 |
Authors
Dates
2021-10-21—Published
2020-08-24—Filed