Trojan detection method and apparatus thereof
A Trojan horse, undetected technology, applied in the field of communications, can solve problems such as inability to detect Trojan horses
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] Since there is a Trojan heartbeat detection in almost all sessions initiated by a Trojan horse, it is possible to detect whether the session is a session initiated by a Trojan horse by detecting whether there is a Trojan horse heartbeat detection in a session. And, because in the session that Trojan horse initiates, the message that control terminal sends to the controlled end as Trojan horse control order also has some special characteristics, therefore can be checked whether the message in a conversation conforms to the message of Trojan horse control command message. feature to detect whether the session is a session initiated by a Trojan horse. In the embodiment of the present invention, the Trojan horse is detected by combining the Trojan horse heartbeat detection and the Trojan horse control command, so that the Trojan horse existing in the network can be detected, and the false alarm rate is reduced, so the Trojan horse existing in the network can be effectively d...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 