US 11,914,724 B2
Systems and methods for adjusting data protection levels based on system metadata
Nikolay Grebennikov, Moscow (RU); Candid Wüest, Bassersdorf (CH); Serguei Beloussov, Costa del Sol (SG); and Stanislav Protasov, Singapore (SG)
Assigned to Acronis International GmbH, Schaffhausen (CH)
Filed by Acronis International GmbH, Schaffhausen (CH)
Filed on Dec. 19, 2021, as Appl. No. 17/555,462.
Claims priority of provisional application 63/130,531, filed on Dec. 24, 2020.
Prior Publication US 2022/0207160 A1, Jun. 30, 2022
Int. Cl. G06F 21/60 (2013.01); G06F 21/56 (2013.01)
CPC G06F 21/604 (2013.01) [G06F 21/566 (2013.01); G06F 21/602 (2013.01); G06F 2221/034 (2013.01); G06F 2221/2113 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A method for adjusting data protection levels based on system metadata, the method comprising:
monitoring a computing device for a cyberattack, wherein a kernel driver of the computing device is configured to allow access to kernel control paths and hash tables in accordance with a first protection level;
detecting that the cyberattack is in progress;
while the cyberattack is in progress,
identifying kernel control paths and hashes of software objects that will be affected by the cyberattack;
configuring the kernel driver to disable access to the identified kernel control paths and hashes of the software objects in accordance with a second protection level, wherein the second protection level comprises greater access restrictions to the computing device than the first protection level.