Zombie host detection method, detection device and firewall
A zombie host and detection method technology, which is applied in the field of network security, can solve the problems of low accuracy of zombie host detection methods, achieve the effects of reducing the misjudgment rate of zombie detection, improving the detection rate, and solving low accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.
[0038] Firstly, an embodiment of the detection method for a zombie host provided by the present invention is introduced.
[0039] figure 1 The flow chart of the detection method of zombie host according to the embodiment of the present invention, as figure 1 As shown, the detection method includes the following steps S102 to S108.
[0040] Step S102: Detect the network behavior of the internal host of the gateway to obtain the host behavior.
[0041] This step can be realized by a detection engine, which can be composed of a series of engines to detect the network behavior of the detected host from different aspects, such as malicious URL / IP detection engine, signature matching detection eng...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com