Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method of protecting computing device from malicious objects using complex infection schemes

A malware, malicious technology used in the field of computer protection against malware with complex infection patterns, capable of solving problems such as computer damage, not being effective

Active Publication Date: 2012-08-29
AO KASPERSKY LAB
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Also, each component may not perform malicious actions by itself, but when combined their actions can cause damage to your computer
Common malware detection methods may not be effective in detecting this multi-component malware with complex infection patterns

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method of protecting computing device from malicious objects using complex infection schemes
  • System and method of protecting computing device from malicious objects using complex infection schemes
  • System and method of protecting computing device from malicious objects using complex infection schemes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Exemplary embodiments of the present invention are described herein in terms of systems, methods, and computer program products for detection of computer malware. Those of ordinary skill in the art should understand that the following description is only exemplary and not intended to be limiting in any way. Other embodiments will readily occur to those skilled in the art having the benefit of this disclosure. Reference will now be made in detail to implementations of exemplary embodiments of the invention which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings and the following description to refer to the same or like items.

[0014] figure 1 One exemplary embodiment of a malware detection system is illustrated. The system may be implemented on a personal computer, server, network router, mobile phone, or other electronic device (commonly referred to herein as a computer) that requires pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Method is realised by isolating processes launched from those inspection objects which are trusted using a means of analysing objects. Then, using a means of creating contexts, contexts are created and stored in a means of storing contexts. These contexts are then analysed by a means of analysing contexts using rule bases from the means of storing rule bases in order to detect malicious objects. Based on results of analysing the created contexts, this invention enables to determine malicious objects from malicious processes launched from said objects and protect a computing device from actions of the malicious objects by ending these malicious processes. ^ EFFECT: high level of protecting computing devices from malicious objects owing to analysis of processes on the computing device and ending processes launched from the malicious objects.

Description

technical field [0001] The present invention relates to the field of computer security, and more particularly to systems and methods for computer protection against malware with complex infection patterns. Background technique [0002] Computer malware, such as viruses, worms, and Trojan horses, pose a significant security threat to computer systems and networks. To combat the ever-increasing spread of computer malware, a large number of antivirus detection techniques have been developed. However, not all malware detection methods are effective at protecting computers against malware; especially when malware is specifically designed to evade these detection methods. [0003] In the simplest case, malware can be a single component or object, such as an executable file that, if launched, performs an action that can cause damage to the computer. Common malware detection techniques, such as signature or heuristic analysis, typically detect single-component malware. However, m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/55G06F21/56
CPCG06F21/552G06F21/566
Inventor 阿列克谢·A·波利亚科夫弗拉季斯拉夫·V·马蒂嫩科尤里·G·斯洛博迪亚努克丹尼斯·A·纳扎罗夫米哈伊尔·A·帕夫柳席奇卡
Owner AO KASPERSKY LAB