Protection method and protection system for corpse Trojans in mobile Internet
A mobile Internet and Trojan horse technology, applied in the field of information security, can solve the problems that the detection system is difficult to collect enough information, the activities are difficult to be found, and the Internet access costs are high, so as to reduce the traffic, improve the detection rate, and reduce the false alarm rate. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] A method and system for protecting zombies and Trojan horses in the mobile Internet of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0028] Such as figure 1 Shown, a kind of zombie Trojan horse protection method in the mobile Internet of the present invention comprises the steps:
[0029] Step S1, capture the mobile Internet user's Internet access network data packet;
[0030] Step S2, performing mobile zombie Trojan horse detection;
[0031] Step S3, performing mobile zombie Trojan horse activity detection;
[0032] Step S4, performing alarm and protection processing on the found mobile zombie Trojan horse and mobile zombie Trojan horse activities.
[0033] Among them, the mobile zombie Trojan can be detected by using the mobile zombie Trojan characteristic code and / or the mobile zombie Trojan behavior characteristic model; the mobile zombie Trojan can be detected by using the mobile zombie Trojan activity c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


