FIELD: information technology.
SUBSTANCE: invention is intended to ensure information security. Disclosed is a method for detecting suspicious activity, according to which the command line interpreter execution is detected using the heuristic rules applied to the log generated by the command line interpreter; analysis of logs dynamically generated by the command line interpreter; analysis of network traffic, in which control commands, scripts and other data transmitted to the command line interpreter are searched; collecting information on activity associated with execution of the detected command line interpreter, wherein the information is a set of function calls and parameters describing these functions; data provided to the command line interpreter by: transmission over a network, receiving from a user through an input/output mechanism, simulating user input or executing a script; detecting interactive input, carried out by means of inter-process communication, into a command line interpreter based on analysis of collected information on activity associated with use of the command line interpreter; collecting data on the detected interactive input, wherein the collected data is at least information on actions aimed at replacing one file with another file; making a decision on suspicious activity associated with use of command line interpreter, based on analysis of collected data; actions are taken to limit the operation of the command line interpreter to eliminate possible damage to data.
EFFECT: detecting suspicious activity of using a command line interpreter.
11 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD OF DETECTING MALICIOUS SCRIPT | 2017 |
|
RU2659738C1 |
SYSTEM AND METHOD OF DETECTING THE HARMFUL CODE IN THE ADDRESS PROCESS SPACE | 2017 |
|
RU2665910C1 |
SYSTEM AND METHOD OF DETECTING THE SIGNS OF COMPUTER ATTACKS | 2017 |
|
RU2661533C1 |
SYSTEM AND METHOD OF DETECTING MALICIOUS FILES OF CERTAIN TYPE | 2014 |
|
RU2583712C2 |
METHOD OF DETECTING MALICIOUS EXECUTABLES, CONTAINING INTERPRETER, BY COMBINING EMULATORS | 2015 |
|
RU2622627C2 |
EMULATOR AND METHOD FOR EMULATION | 2020 |
|
RU2757409C1 |
SYSTEM AND METHOD OF DETECTING A MALICIOUS FILE | 2018 |
|
RU2739865C2 |
SYSTEM AND METHOD OF MANAGING COMPUTING RESOURCES FOR DETECTING MALICIOUS FILES | 2017 |
|
RU2659737C1 |
SYSTEM AND METHOD OF CLASSIFYING OBJECTS OF COMPUTER SYSTEM | 2018 |
|
RU2724710C1 |
SYSTEM AND METHOD FOR IDENTIFYING MALICIOUS FILES | 2017 |
|
RU2673407C1 |
Authors
Dates
2024-04-16—Published
2023-03-23—Filed