Method and system for detecting file stealing Trojan based on thread behavior

A file detection and thread technology, which is applied in the field of Trojan horse stealing file detection based on thread behavior, can solve the problems of false positives, failure to detect Trojan horse stealing file behavior, inconsistent time to read and send files, etc., and achieve the effect of accurate recognition rate.

Active Publication Date: 2012-03-28
HARBIN ANTIY TECH
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing patent "File Transfer Monitoring Method Based on Process Correlation" uses the data content of conventional network protocols HTTP, FTP, and SMTP to determine whether a file transfer is in progress. Since the protocol adopted by most Trojan horses is a non-standard application protocol for file transfer, standard protocol parsing and matching data cannot detect most Trojan horse stealing files
At the same time, the purpose of this method in the application is to prevent information leakage, but it will generate false positives for files uploaded by users' active IE mail uploads, FTP and other tools, but it cannot detect Trojan horses and cause false positives.
In addition, the patent implementation technology needs to use the file access time to match the data packet sending time to judge the file transmission. This method will cause some Trojan horses to perform compression processing and special transformation after reading the file before sending it, resulting in the reading time of the file being different from the network sending time. time is not consistent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting file stealing Trojan based on thread behavior
  • Method and system for detecting file stealing Trojan based on thread behavior
  • Method and system for detecting file stealing Trojan based on thread behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0044] The invention provides a method and system for detecting files stolen by a Trojan horse based on thread behavior. The method and system greatly reduce false positives for normal file transmission and improve the detection of files stolen by a Trojan horse.

[0045] First introduce a kind of Trojan stealing file detection method based on thread behavior that the present invention provides, concrete implementation steps are as follows figure 1 shown, including:

[0046] S101, monitor the file operation and network operation of the thread; the file operation includes openi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for detecting file stealing Trojan based on a thread behavior, which comprises the following steps of: monitoring file operation and network operation of a thread; forming a behavior sequence buffer queue by the monitored thread, the process of the monitored thread, intercepted file operation, data read by a file, the network operation and data transmitted by a network; judging whether the file read by the thread is a file transmitted by the network or not according to the behavior sequence in the buffer queue; and if SO, checking whether the thread and the process of the thread have secrecy, if SO, judging whether a behavior that Trojan steals the file exists. The invention also provides a system for detecting the file stealing Trojan based on the thread behavior. According to the method and the system, provided by the invention, the misreport of the normal file transmission can be reduced, and the detection to the behavior that the Trojan steals the file is improved.

Description

technical field [0001] The invention relates to the field of malicious behavior detection of computer malware, in particular to a method and system for detecting files stolen by Trojans based on thread behavior. Background technique [0002] The technology of using Trojan horses to transfer files to protect the security of files has not yet appeared in mainstream antivirus software. The current monitoring of Trojan horse detection behavior is mainly through the creation of remote threads, services, and other abnormal actions of Trojan horses, rather than data security monitoring. [0003] The existing patent "File Transfer Monitoring Method Based on Process Correlation" uses the data content of conventional network protocols HTTP, FTP, and SMTP to determine whether a file transfer is in progress. Since the protocol adopted by most Trojans is a non-standard application protocol for file transfer, standard protocol parsing and matching data cannot detect most Trojans stealing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/00G06F21/56
Inventor 康学斌肖新光
Owner HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products