FIELD: computer technology.
SUBSTANCE: method for detecting a cryptojacker in a user's computer device contains stages at which statistics are generated on the amount of load on the processor system, the volume of external network traffic and the intensity of calls to crypto libraries, respectively, by cryptojackers and "legitimate" computing processes on the user's computer device and, on this basis, the adapted threshold values of the corresponding parameters are determined, excesses of which are considered as signs for classifying the analyzed computing processes as processes of cryptojacker programs.
EFFECT: ensuring the detection of browser and file cryptojackers without a significant decrease in performance and while adapting detection parameters to the characteristics of user computing processes.
3 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF DETECTING NETWORK ATTACKS BASED ON ANALYZING FRACTAL TRAFFIC CHARACTERISTICS IN AN INFORMATION COMPUTER NETWORK | 2019 |
|
RU2713759C1 |
SYSTEM AND METHOD OF SETTING SECURITY SYSTEMS UNDER DDOS ATTACKS | 2017 |
|
RU2659735C1 |
SYSTEM AND METHOD OF DETERMINATION OF DDOS-ATTACKS UNDER FAILURE OF SERVICE SERVERS | 2017 |
|
RU2665919C1 |
DDoS-ATTACKS DETECTION SYSTEM AND METHOD | 2017 |
|
RU2676021C1 |
METHOD AND SYSTEM SEARCHING WIRELESS ACCESS POINTS APPROVED BY DEVICE | 2014 |
|
RU2592387C2 |
METHOD OF PROTECTION AGAINST DDOS-ATTACK ON BASIS OF TRAFFIC CLASSIFICATION | 2018 |
|
RU2704741C2 |
SYSTEM AND METHOD OF CORRELATING EVENTS FOR DETECTING INFORMATION SECURITY INCIDENT | 2019 |
|
RU2739864C1 |
METHOD OF FRAUDULENT TRANSACTIONS DETECTING SYSTEM OPTIMIZING | 2015 |
|
RU2599943C2 |
GENERATION METHOD OF COMMON SECRET KEY OF TWO REMOTE SUBSCRIBERS OF TELECOMMUNICATION SYSTEM | 2009 |
|
RU2412548C1 |
CONTROL METHOD OF NEUROPROCESSOR RESPONSE TO INPUT SIGNALS | 2018 |
|
RU2724784C2 |
Authors
Dates
2024-01-18—Published
2022-09-13—Filed