FIELD: computer technology.
SUBSTANCE: technical solution relates to the field of computer technology. The expected result is achieved due to the fact that traffic is received by the communication module of the internal device; a suspicious IP address is detected by the analysis module of the internal device; a suspicious device with a suspicious IP address is scanned by the scanning module of the internal device, and a list of running services is obtained; the internal device communication module sends a suspicious IP address and a list of services to an external device; the external device analysis module compares the list of services with known malicious services; if there are such services, the external device notification module creates a report on the detection of malicious activity; in the absence of matches, the analytical module of the external device calculates the ownership interval of the suspicious IP address, and if the interval is less than the threshold value, the suspicious device is considered malicious and a report on malicious activity is created by the external device notification module, if the ownership interval is greater than the threshold value, the suspicious device is considered legitimate.
EFFECT: increase the accuracy of detecting compromise of the protected infrastructure by intruders or malware.
8 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD FOR OUTSIDE CONTROL OF THE CYBERATTACK SURFACE | 2021 |
|
RU2778635C1 |
METHOD AND COMPUTING DEVICE FOR DETECTING TARGET MALICIOUS WEB RESOURCE | 2022 |
|
RU2791824C1 |
METHOD OF ANALYSING AND DETECTING MALICIOUS INTERMEDIATE NODES IN NETWORK | 2012 |
|
RU2495486C1 |
SEARCH FOR SECURITY PROBLEMS IN SOFTWARE AND OPERATING SYSTEMS IN PUBLIC CLOUDS | 2023 |
|
RU2825724C1 |
METHOD AND SYSTEM FOR DETECTING THE INFRASTRUCTURE OF A MALICIOUS SOFTWARE OR A CYBERCRIMINAL | 2020 |
|
RU2722693C1 |
METHOD OF ANALYSING MALICIOUS ACTIVITY ON INTERNET, DETECTING MALICIOUS NETWORK NODES AND NEIGHBOURING INTERMEDIATE NODES | 2012 |
|
RU2523114C2 |
SYSTEM AND METHOD OF PROTECTING CLOUD INFRASTRUCTURE FROM ILLEGAL USE | 2012 |
|
RU2536663C2 |
METHOD AND SYSTEM FOR DETECTING MALICIOUS FILES BY GENERATING ADS ON ONLINE TRADING PLATFORMS | 2019 |
|
RU2727932C1 |
METHOD FOR CLASSIFYING OBJECTS TO PREVENT SPREAD OF MALICIOUS ACTIVITY | 2023 |
|
RU2808385C1 |
SYSTEM AND METHOD OF CORRELATING EVENTS FOR DETECTING INFORMATION SECURITY INCIDENT | 2019 |
|
RU2739864C1 |
Authors
Dates
2022-03-28—Published
2021-06-10—Filed