Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for rebuilding network behavior function of rebounding Trojan horse control terminal

A control terminal and Trojan horse technology, applied in the control analysis of Trojan horses and the field of Trojan horses, can solve the problems of high risk and difficult analysis, and achieve the effects of preventing self-destruction, facilitating identification, and reducing the possibility of

Inactive Publication Date: 2016-08-10
WUXI CINSEC INFORMATION TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a method and system for rebuilding the network behavior function of the rebounding Trojan horse control terminal, which is used to solve the problems of difficult analysis and high risk in the analysis of the rebounding Trojan horse program in the prior art. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for rebuilding network behavior function of rebounding Trojan horse control terminal
  • Method and system for rebuilding network behavior function of rebounding Trojan horse control terminal
  • Method and system for rebuilding network behavior function of rebounding Trojan horse control terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031]Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0032] The purpose of the present invention is to provide a method and system for reconstructing the network behavior function of the rebounding Trojan horse control terminal, which is used to solve the problems of difficult analysis and high risk in the analysis of the rebounding Trojan horse program in the prior art. The principle and implementation mode of the method and system of a kind of rebound Trojan horse control terminal netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and system for rebuilding the network behavior function of the rebounding Trojan control terminal. The system includes: a secret shield disassembly analysis module, which uses a static semantic analysis method to analyze the execution program of the rebounding Trojan to form a complete assembly code of the rebounding Trojan. , and obtain the cryptographic algorithm and key material; the secret shield multi-path analysis module obtains the code execution path parameters, analyzes and constructs all possible paths and obtains the detailed information of network access and network function calls during the execution of the rebounding Trojan horse, and executes various path; the Midun Trojan control terminal generation module generates a rebound Trojan control terminal function program segment according to the generated encryption key, the detailed information of the network access and network function call; the simulated rebound Trojan control terminal responds to the rebound Trojan request and completes the encryption Data verification, generating a report reflecting the network behavior function of the rebounding Trojan horse control terminal. The invention can safely and effectively rebuild the important function of the network behavior of the rebound Trojan horse control terminal.

Description

technical field [0001] The invention relates to the technical field of Trojan horses, in particular to the technical field of control and analysis of Trojan horses, in particular to a method and system for rebuilding network behavior functions of a control terminal of a rebounding Trojan horse. Background technique [0002] A rebound Trojan is a service program that resides in the user's computer, while the attacker controls the corresponding client program. The service program opens the connection resources of the user's computer through a specific port. Once the client program mastered by the attacker sends a request, the rebounding Trojan will connect with him and steal the user's information. [0003] After analyzing the characteristics of the firewall, the rebound port Trojan found that: the firewall often performs very strict filtering on incoming links, but neglects to prevent outgoing links. Therefore, contrary to general Trojan horses, the server (controlled end) ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26
Inventor 耿振民
Owner WUXI CINSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products