-
公开(公告)号:US11562067B2
公开(公告)日:2023-01-24
申请号:US17201282
申请日:2021-03-15
Applicant: Acronis International GmbH
Inventor: Vladimir Strogov , Anatoly Stupak , Andrey Kulaga , Alexey Sergeev , Serguei Beloussov , Stanislav Protasov
Abstract: Disclosed herein are systems and method for inspecting archived slices for malware using empty spare files. In one exemplary aspect, the method comprises generating a backup slice and a virtual volume comprising a list of files in the backup slice and associated file information. The method comprises mounting the virtual volume to a disk. The method comprises creating, in the virtual volume, empty sparse files that are placeholders of the files reference in the list of files. The method comprises detecting a change between a respective empty sparse file and a corresponding file in a previous backup slice and accordingly storing the actual content of the file in the virtual volume in place of the respective empty sparse file. The method comprises scanning the virtual volume for malicious software and generating a cured slice that replaces the backup slice in the backup archive upon detection.
-
公开(公告)号:US20220321397A1
公开(公告)日:2022-10-06
申请号:US17301275
申请日:2021-03-30
Applicant: Acronis International GmbH
Inventor: Alexander Tormasov , Anatoly Stupak , Serguei Beloussov , Stanislav Protasov
Abstract: An anomaly detection system uses an AI engine to analyze configurations and backups to identify and assess anomalies. Backup data and configurations are used to characterize events as either secure or insecure.
-
公开(公告)号:US10671567B2
公开(公告)日:2020-06-02
申请号:US16120594
申请日:2018-09-04
Applicant: Acronis International GmbH
Inventor: Andrey Redko , Stanislav Protasov , Serguei Beloussov , Anatoly Stupak
Abstract: The present disclosure provides systems and methods for optimizing lock detection in a change block tracker (CBT). A method comprises detecting changes on a disk volume and saving them to current changes, creating a volume changes and a snapshot changes collection, on a snapshot creation request, moving current changes to frozen changes, on a lock request, moving changes to the volume changes collection of the current snapshot, on another lock request, moving volume changes of current snapshot to frozen changes and deleting snapshot changes of current snapshot, when snapshot name is not the same as current snapshot, otherwise: moving the volume changes collection to the frozen changes, copying the frozen changes to the current changes, moving the snapshot changes collection to the frozen changes, and copying the snapshot changes collection to the current changes, moving all volume changes for other snapshots to current changes and allowing the client to read the frozen changes.
-
公开(公告)号:US11630741B2
公开(公告)日:2023-04-18
申请号:US17487449
申请日:2021-09-28
Applicant: Acronis International GmbH
Inventor: Anatoly Stupak , Dmitry Kogtev , Serguei Beloussov , Stanislav Protasov
Abstract: Disclosed herein are systems and method for backing up data in a load-balanced clustered environment. A clustered resource to be backed up is selected, wherein the clustered resource is stored on a common storage system and operated on by a cluster-aware application executing on at least a first node and a second node of a computing cluster. A load-balanced application may migrate the clustered resource from the first node with a high-load consumption to the second node with low-load consumption. A list of changes made by both nodes are received and merged. A backup agent then generates a consistent incremental backup using data retrieved from the common storage system according to the merged list of changes to the clustered resource.
-
公开(公告)号:US11210177B2
公开(公告)日:2021-12-28
申请号:US16589188
申请日:2019-10-01
Applicant: Acronis International GmbH
Inventor: Anatoly Stupak , Dmitry Kogtev , Serguei Beloussov , Stanislav Protasov
Abstract: Disclosed herein are systems and method for backing up data in a clustered environment. A clustered resource to be backed up is selected, wherein the clustered resource is stored on a common storage system and operated on by a cluster-aware application executing on two or more nodes of a computing cluster. A first backup agent executing on a first node of the computing cluster may determine a list of changes to the clustered resource and may receive at least one list of changes to the clustered resource that are tracked by peer backup agents executing on other nodes of the computing cluster. The first backup agent may merge the lists of changes to the clustered resource, and may generate a consistent incremental backup using data retrieved from the common storage system according to the merged lists of changes to the clustered resource.
-
公开(公告)号:US20210200866A1
公开(公告)日:2021-07-01
申请号:US17201282
申请日:2021-03-15
Applicant: Acronis International GmbH
Inventor: Vladimir Strogov , Anatoly Stupak , Andrey Kulaga , Alexey Sergeev , Serguei Beloussov , Stanislav Protasov
IPC: G06F21/56
Abstract: Disclosed herein are systems and method for inspecting archived slices for malware using empty spare files. In one exemplary aspect, the method comprises generating a backup slice and a virtual volume comprising a list of files in the backup slice and associated file information. The method comprises mounting the virtual volume to a disk. The method comprises creating, in the virtual volume, empty sparse files that are placeholders of the files reference in the list of files. The method comprises detecting a change between a respective empty sparse file and a corresponding file in a previous backup slice and accordingly storing the actual content of the file in the virtual volume in place of the respective empty sparse file. The method comprises scanning the virtual volume for malicious software and generating a cured slice that replaces the backup slice in the backup archive upon detection.
-
公开(公告)号:US20190286821A1
公开(公告)日:2019-09-19
申请号:US16354612
申请日:2019-03-15
Applicant: Acronis International GmbH
Inventor: Vladimir Strogov , Serguei Beloussov , Alexey Dod , Valery Chernyakovsky , Anatoly Stupak , Sergey Ulasen , Nikolay Grebennikov , Vyacheslav Levchenko , Stanislav Protasov
Abstract: Disclosed are systems and methods for detecting malicious applications. The described techniques detect a first process has been launched on a computing device, and monitor at least one thread associated with the first process using one or more control points of the first process. An execution stack associated with the one or more control points of the first process is received from the first process. In response to detecting activity on the one or more control points of the first process, an indication that the execution of the first process is malicious is generated by applying a machine learning classifier to the received execution stack associated with the one or more control points of the first process.
-
公开(公告)号:US10095589B2
公开(公告)日:2018-10-09
申请号:US15176556
申请日:2016-06-08
Applicant: Acronis International GmbH
Inventor: Maxim V. Lyadvinsky , Andrey Redko , Ivan Kukhta , Anatoly Stupak , Serguei Beloussov , Stanislav M. Protassov , Mark Shmulevich
IPC: G06F9/44 , G06F11/14 , G06F9/4401 , G06F9/46
Abstract: A method and system is provided for optimization of restoration and loading of an operating system of a computer. An exemplary method includes initiating a loading of the operating system of the computer and intercepting a read request of data of a data volume from the operating system. Furthermore, the method includes determining whether the data has previously been restored during the loading of the operating system, and, if the data has previously been restored, performing the read request and returning to the loading of the operating system of the computer. Alternatively, if the data has not previously been restored, determining whether the data is stored in cache of the computer. If the data is not be stored in the cache, the method includes reading the data from a data archive and storing the data read from the data archive to the cache.
-
公开(公告)号:US11936513B2
公开(公告)日:2024-03-19
申请号:US17301275
申请日:2021-03-30
Applicant: Acronis International GmbH
Inventor: Alexander Tormasov , Anatoly Stupak , Serguei Beloussov , Stanislav Protasov
IPC: H04L41/0604 , G06N20/00 , H04L41/0631 , H04L41/0853 , H04L41/5041 , H04L43/065 , H04L43/0817 , H04L43/10
CPC classification number: H04L41/0627 , G06N20/00 , H04L41/064 , H04L41/0856 , H04L41/5041 , H04L43/065 , H04L43/0817 , H04L43/10
Abstract: An anomaly detection system uses an AI engine to analyze configurations and backups to identify and assess anomalies. Backup data and configurations are used to characterize events as either secure or insecure.
-
公开(公告)号:US11762994B2
公开(公告)日:2023-09-19
申请号:US17717789
申请日:2022-04-11
Applicant: Acronis International GmbH
Inventor: Vladimir Strogov , Anatoly Stupak , Andrey Kulaga , Alexey Sergeev , Serguei Beloussov , Stanislav Protasov
CPC classification number: G06F21/561 , G06F11/1451 , G06F16/128 , G06F21/565 , G06F2201/82 , G06F2221/033
Abstract: Disclosed herein are systems and method for inspecting archived slices for malware. In one exemplary aspect, the method comprises identifying a first slice in a plurality of slices in a backup archive, wherein the first slice is an image of user data at a first time. The method comprises scanning the first slice of the plurality of slices in the backup archive and detecting at least one infected file in the first slice. The method comprises identifying a block of the first slice that corresponds to the at least one infected file. The method comprises mounting, to a disk, a second slice of the plurality of slices. The method comprises tracking the block and determining that the at least one infected file exists on the second slice and removing the infected file from the second slice by generating a respective cured slice of the second slice.
-
-
-
-
-
-
-
-
-