A malicious code infection host scale estimation system and method
A malicious code and host technology, applied in the field of network communication security, can solve security risks, affect data integrity, privacy protection and other issues, and achieve strong practicability, easy deployment and implementation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0019] see figure 1 As shown, the system for estimating the scale of malicious code-infected hosts in a specific area based on DNS cache detection includes a DNS resolver search module, a DNS detection module, and a malicious code-infected host scale estimation module.
[0020] The DNS resolver search module is used to search for a DNS resolver that can be used as a probe within a specific area (for example, a geographical area, such as a specified country, province, or city). Each DNS resolver output by this module corresponds to a network domain that can be used to estimate the scale of malicious code infected hosts.
[0021] The DNS detection module is used to detect in real time the cached information of the command and control domain names of one or more malicious codes in the DNS resolver provided by the DNS resolver search module, as...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 