Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Webpage trojan detection method and system

A web page Trojan and detection method technology, applied in the field of network security, can solve the problems of complex Trojan detection process and increase the consumption of hardware resources in the web Trojan detection environment, so as to reduce the probability of missed detection, improve accuracy and scalability, and avoid wasteful effect

Active Publication Date: 2014-12-10
三六零数字安全科技集团有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, obviously this will greatly increase the hardware resource consumption of the web page Trojan detection environment, and the Trojan detection process will be more complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webpage trojan detection method and system
  • Webpage trojan detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0041] First of all, it needs to be explained that since the webpage Trojan horse usually executes malicious codes through the script in the webpage to achieve the purpose of attacking the user system, and the webpage is generally opened by the browser, therefore, if the webpage Trojan horse wants to target users outside the browser In order to attack the vulnerabilities of other third-party software, the webpage must be able to call the functions of the third-party software through the browse...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a webpage trojan detection method and system which are applied to a webpage trojan detection environment. In the invention, an ActiveX control is simulated, different loophole functions existing in different versions of the same third-party software are integrated in the simulated ActiveX control, the classid of the simulated ActiveX control is set to be the same as the same classid of the ActiveX control of the third-party software of different versions, and the simulated ActiveX control is installed in the webpage trojan detection environment. The method comprises the following steps of: receiving a message of the called loophole function sent by a script running in the webpage to the simulated ActiveX control through the classid; returning the corresponding loophole function existing in the simulated ActiveX control to the script running in the webpage; and monitoring the behavior of the script so as to determine whether trojan exists in the webpage. Through the invention, the webpage trojan detection environment is compatible with the loopholes of multiple versions of the same software, and the accuracy and expansibility in webpage trojan detection are improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and system for detecting a webpage Trojan horse. Background technique [0002] Web page Trojans are a common attack method used by hackers. Web page Trojans usually use third-party software vulnerabilities to attack the operating system. From the perspective of attack effect, it can be divided into two types, one is caused by the browser itself, and the other is caused by the ActiveX control. The first type is mainly to directly use the loopholes in the browser itself to carry out malicious attacks, while the second type is equivalent to indirectly using the browser to realize the attack on the user system. They mainly take advantage of the loopholes of other third-party software, such as the "Baofengyingyin" web Trojan horse. The object of the loopholes is not the browser itself, but the third-party software "Baofengyingyin". This means that only when "Baofen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
Inventor 宋申雷刘起
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products