FIELD: information security.
SUBSTANCE: method for detection of an information attack, performed by a computing device, contains steps, at which: at the preliminary stage, the Internet is scanned, and publication sources are found, sources used for information attacks are identified in found publication sources, accounts are found, which published posts in detected publication sources used for information attacks, among found accounts those are identified, which are controlled by bots, obtained data on sources used for information attacks and accounts controlled by bots is stored in a database. Then, at the working stage, words and phrases are obtained, characterizing a target of an information attack, the Internet is scanned, and publications are found, containing words and phrases characterizing the target of the information attack, hyperlinks are extracted from found publications, using data on sources used for the information attack and accounts controlled by bots, quantitative characteristics of publications and dynamics of their change are counted, based on counted quantitative characteristics, parameters are calculated, characterizing a probability of the presence of an information attack, and, in response to exceeding with at least one calculated parameter a preset threshold value, based on calculated parameters, a type and a level of the attack are determined, a notification about the information attack, as well as about the type and the level of the attack is generated and sent.
EFFECT: provision of automated detection of an information attack, as well as timely informing of responsible persons about attack detection.
12 cl, 9 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD FOR VERIFYING PUBLIC KEY CERTIFICATE TO COUNTERACT "MAN-IN-MIDDLE" ATTACKS | 2012 |
|
RU2514138C1 |
METHOD AND SYSTEM OF SEARCHING FOR RELEVANT NEWS | 2019 |
|
RU2698916C1 |
SYSTEM AND METHOD FOR ACTIVE DETECTION OF MALICIOUS NETWORK RESOURCES | 2021 |
|
RU2769075C1 |
METHOD AND SYSTEM FOR GENERATING THE LIST OF COMPROMISE INDICATORS | 2020 |
|
RU2743619C1 |
METHOD AND SERVER OF DEFINING THE ORIGINAL REFERENCE TO THE ORIGINAL OBJECT | 2016 |
|
RU2660593C2 |
METHOD FOR ADJUSTING THE PARAMETERS OF A MACHINE LEARNING MODEL IN ORDER TO IDENTIFY FALSE TRIGGERING AND INFORMATION SECURITY INCIDENTS | 2020 |
|
RU2763115C1 |
METHOD FOR PROCESSING INFORMATION SECURITY EVENTS PRIOR TO TRANSMISSION FOR ANALYSIS | 2020 |
|
RU2762528C1 |
SYSTEM AND METHOD FOR OUTSIDE CONTROL OF THE CYBERATTACK SURFACE | 2021 |
|
RU2778635C1 |
SYSTEM AND METHOD OF DETECTING THE SIGNS OF COMPUTER ATTACKS | 2017 |
|
RU2661533C1 |
SYSTEMS AND METHODS OF DYNAMIC INDICATORS AGGREGATION TO DETECT NETWORK FRAUD | 2012 |
|
RU2607229C2 |
Authors
Dates
2023-02-06—Published
2021-08-27—Filed