Webpage trojan-linking real-time protection method and system based on cloud

A technology of real-time protection and web security, applied in transmission systems, electrical components, etc., can solve the problems of inability to perform web security real-time protection, web security real-time protection, and large impact range, and achieve zero deployment and zero calculation. Overhead, the effect of preventing proliferation

Active Publication Date: 2014-02-05
INST OF INFORMATION ENG CAS
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] It can be seen from the analysis that none of the above three methods can carry out real-time protection against web page malware, and most of the websites built and hosted on the cloud platform provide external network access s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webpage trojan-linking real-time protection method and system based on cloud
  • Webpage trojan-linking real-time protection method and system based on cloud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0053] Such as figure 1 As shown, the cloud platform of the web page Trojan real-time protection system includes: a real-time protection module, a Trojan link detection and analysis module, and a cloud service registration module.

[0054] The real-time protection module includes two sub-modules: blocking of link requests of Trojans and non-proliferation of Trojan sources. After the real-time protection module receives the access request from the client or the hotlinking request sent by the third-party untrusted server, it quickly queries and matches the requested link with the Trojan link information library provided by the Trojan link detection and analysis module, so as to determine whether Visited the hanging horse link. If it is to access the linked horse link, then block the request to achieve a real-time protection effect, prevent the client fr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trojan-linking protection method and system based on cloud. The system comprises a cloud service registration module, a trojan-linking link detection analysis module, and a real-time protection module. A web server is registered to a cloud platform through the cloud service registration module. Through DNS agent analysis, requests and response data flows of the web server are all forwarded to the cloud platform for safe processing. The trojan-linking link detection analysis module detects trojan-linking links through analyzing characteristics and behavior information such as webpages and link elements. Request to intercept is conducted on the webpage trojan-linking links through the real-time protection module. The method and system can block trojan linking links in the web server protected by the cloud platform in real time, prevent trojan-linking sources from spreading, does not change browse habits of a client side due to the fact that no installation software needs installing at the client side and a server side, and is transparent in version and configuration of the web server.

Description

technical field [0001] The invention relates to the field of computer network security, in particular, to a cloud-based real-time protection method and system for web page Trojan horses. Background technique [0002] Web page Trojan is a web service-based network attack against customers. The hacker first breaks through the web server and adds the webpage Trojan horse to the normal HTML page. When a client visits this page, the webpage Trojan horse will be transmitted back to the client machine together with the normal HTML page, and the system vulnerability of the client terminal will be used to automatically download and execute the remote machine. Malicious code on the computer can completely control the customer's machine. The personal account information on the customer's machine may be obtained by hackers, resulting in the loss of the customer's personal property. Moreover, the client machine may be controlled by hackers for a long time and be added to the botnets wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06
Inventor 马多贺徐震宋晨郭川陈凯汤伟
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products