Protection system of applications on "Windows" platform on the basis of activity profile
Journal of computational and engineering mathematics, Tome 3 (2016) no. 3, pp. 3-9.

Voir la notice de l'article provenant de la source Math-Net.Ru

The paper deals with a description of the developed prototype of application protection module based on an activity profile. It is based on proactive protection technology. A description of behaviors injected in controlled processes is given, and an architecture of the security module and interactions of end-users with the system are considered. The module is designed in C#.
Keywords: anti-virus software, malicious software, application activity profile, proactive protection, DLL injection, interaction of malicious software with the system.
@article{JCEM_2016_3_3_a0,
     author = {N. O. Artes and S. M. Elsakov},
     title = {Protection system of applications on {"Windows"} platform on the basis of activity profile},
     journal = {Journal of computational and engineering mathematics},
     pages = {3--9},
     publisher = {mathdoc},
     volume = {3},
     number = {3},
     year = {2016},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a0/}
}
TY  - JOUR
AU  - N. O. Artes
AU  - S. M. Elsakov
TI  - Protection system of applications on "Windows" platform on the basis of activity profile
JO  - Journal of computational and engineering mathematics
PY  - 2016
SP  - 3
EP  - 9
VL  - 3
IS  - 3
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a0/
LA  - en
ID  - JCEM_2016_3_3_a0
ER  - 
%0 Journal Article
%A N. O. Artes
%A S. M. Elsakov
%T Protection system of applications on "Windows" platform on the basis of activity profile
%J Journal of computational and engineering mathematics
%D 2016
%P 3-9
%V 3
%N 3
%I mathdoc
%U http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a0/
%G en
%F JCEM_2016_3_3_a0
N. O. Artes; S. M. Elsakov. Protection system of applications on "Windows" platform on the basis of activity profile. Journal of computational and engineering mathematics, Tome 3 (2016) no. 3, pp. 3-9. http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a0/

[1] Official Website of Kaspersky Lab. The Classification of Malware } (accessed on 20 March 2016) {\tt http://www.kaspersky.ru/internet-security-center/threats/malware- classifications

[2] Official Website of Kaspersky Lab. What Conditions are Need to Spread Malware } (accessed on 20 March 2016) {\tt http://www.kaspersky.ru/internet-security-center/threats/hacking-system- vulnerabilities

[3] N. O. Artes, S. M. Elsakov, “Sravnitelnyi analiz vzaimodeistviya raznykh vidov vredonosnykh programm na sistemu \flqq Windows\frqq”, Sbornik trudov II vserossiiskoi nauchno-prakticheskoi konferentsii (Chelyabinsk, 2015), Tezisy dokladov, Izdatelskii tsentr YuUrGU, Chelyabinsk, 2015, 11–18

[4] Kaspersky Security Bulletin 2015. Summary Statistics for 2015 } (accessed on 2 February 2016) {\tt https://securelist.ru/analysis/ksb/27543/kaspersky-security-bulletin-2015 -osnovnaya-statistika-za-2015-god/

[5] V. F. Shangin, Informatsionnaya bezopasnost kompyuternykh sistem i setei, ID \flqq FORUM\frqq – INFRA-M, M., 2011

[6] Dzh. Koziol, D. Lichfild, Iskusstvo vzloma i zaschity sistem, Piter, SPb., 2011

[7] K. Kasperski, Kompyuternye virusy iznutri i snaruzhi, Piter, SPb., 2012