Unlock instant, AI-driven research and patent intelligence for your innovation.

Protection method and protection system for corpse Trojans in mobile Internet

A mobile Internet and Trojan horse technology, applied in the field of information security, can solve the problems that the detection system is difficult to collect enough information, the activities are difficult to be found, and the Internet access costs are high, so as to reduce the traffic, improve the detection rate, and reduce the false alarm rate. Effect

Active Publication Date: 2014-07-16
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(2) User expenses. Since the Internet access fees of mobile smart terminals are still relatively high, users can obtain the detailed fees through the operator's bill. If the fees are high due to frequent zombie Trojan activities, users can easily find out
Therefore, mobile zombie Trojans will use more covert techniques to avoid being discovered by users, and their activities will be more difficult to be discovered
In this way, it is difficult for the traditional detection system to collect enough information, and the detection is extremely difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method and protection system for corpse Trojans in mobile Internet
  • Protection method and protection system for corpse Trojans in mobile Internet
  • Protection method and protection system for corpse Trojans in mobile Internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] A method and system for protecting zombies and Trojan horses in the mobile Internet of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0028] Such as figure 1 Shown, a kind of zombie Trojan horse protection method in the mobile Internet of the present invention comprises the steps:

[0029] Step S1, capture the mobile Internet user's Internet access network data packet;

[0030] Step S2, performing mobile zombie Trojan horse detection;

[0031] Step S3, performing mobile zombie Trojan horse activity detection;

[0032] Step S4, performing alarm and protection processing on the found mobile zombie Trojan horse and mobile zombie Trojan horse activities.

[0033] Among them, the mobile zombie Trojan can be detected by using the mobile zombie Trojan characteristic code and / or the mobile zombie Trojan behavior characteristic model; the mobile zombie Trojan can be detected by using the mobile zombie Trojan activity c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for protecting zombies and Trojan horses in the mobile Internet, relating to the field of information security. The protection method comprises the following steps: step S1, capturing mobile Internet users' Internet access network data packets; step S2, detecting mobile zombie Trojan horses; step S3, performing mobile zombie Trojan horse activity detection; step S4, detecting mobile zombie Trojan horses and mobile zombie Trojan horses found Activities are alerted and protected. The protection system includes a network packet capture module, a mobile zombie Trojan horse detection module, a mobile zombie Trojan horse activity detection module, and a mobile zombie Trojan horse alarm and protection module. A method and system for protecting zombie Trojans in the mobile Internet of the present invention can effectively detect known mobile zombie Trojans and have the ability to detect unknown mobile zombie Trojans, can effectively detect known mobile zombie Trojan activities and have the ability to detect unknown mobile zombie Trojans activity capacity.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for protecting zombies and Trojan horses in the mobile Internet. Background technique [0002] The Trojan horse is a remote hacker control tool. Once the user is infected with the Trojan horse, the information on the user's computer will be exposed to the hacker. The Trojan horse technology mainly adopts a one-to-one control technology, that is, hackers control the computer infected with the Trojan horse, and the main purpose is to steal information on the client's computer. Compared with traditional Trojan horse technology, botnet is a distributed network attack platform developed on the basis of traditional computer virus, Trojan horse and worm technology. It uses IRC, HTTP, P2P and other technologies to form a large-scale controlled zombie network with multiple zombie machines. Using this controlled botnet as an attack platform, on the one hand, this a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 曾金全
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA