Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trojan horse virus scanning method based on WEB page

A virus scanning and WEB server technology, applied in the field of virus scanning, can solve problems such as server threats, and achieve the effect of improving real-time performance and reducing labor management costs.

Active Publication Date: 2009-12-09
上海盛页信息科技有限公司
View PDF4 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is understood that 80% of the current hacker attacks on the server side are WEB attacks. After hackers obtain WEB permissions, they will immediately upload WEB Trojan horse viruses to further escalate permissions, causing serious threats to the server.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trojan horse virus scanning method based on WEB page

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] An embodiment of the Trojan virus scanning method based on WEB pages of the present invention is as follows: figure 1 As shown, the Trojan horse virus scanning tool is installed on the WEB server side, and the webpage Trojan horse virus files uploaded maliciously by hackers or utilizing WEB vulnerabilities to write are scanned. When there is a characteristic word containing a web page Trojan horse virus in the script file, it will alarm and output the information to a text file. Include the following steps:

[0014] 1. Obtain all WEB directories (including site directories and virtual directories) based on WINDOWS+IIS (that is, the platform is WINDOWS operating system and IIS WEB engine) or LINUX; search for Trojan horse virus samples in scripting languages ​​such as ASP, JSP, PHP, and ASPX , extracting the Trojan horse virus rule base information, loading the Trojan horse virus rule base and the white list according to the Trojan horse virus rule base information;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Trojan horse virus scanning method based on a WEB page, comprising the following steps: (1) obtaining all WEB catalogues of a WEB server; loading a Trojan horse virus rule library containing Trojan horse virus characteristics and a white list of non-Trojan horse virus files; (2) enumerating script files under the WEB catalogues and circularly judging whether contents of the Trojan horse virus rule library are contained or not; (3) if the script files under the WEB catalogues contain the contents in the Trojan horse virus rule library, carrying out the step (4), or else carrying out the step (2); (4) if the script files are contained in the white list, carrying out the step (2); and (5) if the script files are not contained in the white list, alarming. The invention can scan Trojan horse files of the WEB page at the WEB server end and can be suitable for different operating system environments.

Description

technical field [0001] The invention relates to a virus scanning technology, in particular to a WEB web page-based Trojan virus scanning method. Background technique [0002] Currently, computer networks are widely used, and many applications depend on the computer network environment. However, there are more and more viruses in the network environment. For example, computer network viruses can link to chat tools MSN, e-mail, web pages, etc. along with the network. There are more and more Trojan horse viruses for the purpose of stealing personal account passwords and other information, and the harm they produce is also increasing. Most of the current anti-trojan virus anti-virus software is a personal PC based on the WINDOW platform, and the anti-virus software is installed on the client. For the server side of the WEB environment, or for different PC system environments, there is no suitable Trojan horse virus control software. It is understood that currently 80% of hack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26G06F17/30
Inventor 任海翔
Owner 上海盛页信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products