Wooden horse monitoring and auditing method and system thereof
A Trojan horse and behavior technology, applied in the field of Trojan horse monitoring and auditing methods and systems, can solve the problems of network communication content processing and analysis, frequent update of feature library, response lag, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0048] In order to make the above objectives, features and advantages of the present invention more obvious and understandable, the present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.
[0049] First introduce the concept and working principle of Trojan horse:
[0050] A Trojan horse is a program that establishes a connection between remote computers so that the remote computer can control the local computer through the network. Its operation complies with the TCP / IP protocol. Because it sneaks into the user’s computer like a spy, it opens up for other people’s attacks. The back door is very similar to the "Trojan horse" tactics in war, hence the name Trojan horse program.
[0051] The Trojan horse program consists of two parts, one is the agent program installed and implanted in the system of the controlled host, and the other is the control terminal program. After the Trojan horse agent is running, it nee...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap