Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for detecting malicious behaviors in computer system

A computer system and malicious technology, applied in computer security devices, computing, special data processing applications, etc., can solve the problems of insufficient detection of malicious activities and increased complexity of the system

Pending Publication Date: 2019-06-28
AO KASPERSKY LAB
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such systems are insufficient to detect malicious activity, since the complexity of such a task grows non-linearly with the number of objects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for detecting malicious behaviors in computer system
  • System and method for detecting malicious behaviors in computer system
  • System and method for detecting malicious behaviors in computer system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In an embodiment, a functional relationship means a type of association (relationship) between objects in which each object changes concurrently with each other. In functional relations, the main indicators of causality are lacking, especially productivity (objects do not generate each other), temporal asymmetry (objects coexist, one of them does not precede the other) and irreversibility.

[0021] refer to figure 1 , depicts a block diagram of a system 100 for detecting malicious activity in a computer system, according to an embodiment. In an embodiment, the system 100 generally includes a collection tool 110 , a trained selection model 112 , a graph construction tool 120 , a graph database 131 , a search tool 130 and an analysis tool 140 . Optionally, system 100 may include retraining tool 150 . As will be described, system 100 operates on computer system object 111 and will include one or more decisions 141 .

[0022] Collection tool 110 is configured to collect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system and a method for detecting malicious behaviors in a computer system. One or more patterns can be generated based on relations between information objects which are related with the computer system, wherein the information objects are summits in the pattern. Furthermore the relations are edges in the pattern. Comparison between the generated pattern and an existing pattern can determine possibility of the malicious behaviors.

Description

[0001] related application [0002] This application claims the benefit of Russian Application No. 2018123685 filed on June 29, 2018, which is hereby incorporated by reference in its entirety. technical field [0003] Embodiments relate generally to information security assurance techniques, and more specifically, to detecting malicious activity in computer systems. Background technique [0004] The rapid development of computer technology over the past decade and the wide spread of various computing devices (personal computers, laptops, tablets, smartphones, etc.) Great power for a plethora of tasks, from web surfing to bank transfers and electronic file / record keeping. As the number of computing devices and the amount of software that runs on those devices has grown, so has the number of malicious programs that exploit these devices and techniques. [0005] Currently, there are many different types of malicious programs. Certain programs steal personal and confidential...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F16/583
CPCG06F21/566
Inventor 伊戈尔·I·索门科夫谢尔盖·Y·戈洛瓦诺夫
Owner AO KASPERSKY LAB
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More